VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201811-0056 CVE-2018-18439 DENX U-Boot Buffer error vulnerability

Related entries in the VARIoT exploits database: VAR-E-201811-0063
CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
DENX U-Boot through 2018.09-rc1 has a remotely exploitable buffer overflow via a malicious TFTP server because TFTP traffic is mishandled. Also, local exploitation can occur via a crafted kernel image. DENX U-Boot Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Das U-Boot is prone to multiple local arbitrary code-execution vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the U-Boot instance. Failed exploit attempts will likely cause a denial-of-service condition
VAR-201811-0557 CVE-2018-7910 plural Huawei Authentication vulnerabilities in smartphones CVSS V2: 4.6
CVSS V3: 6.8
Severity: MEDIUM
Some Huawei smartphones ALP-AL00B 8.0.0.118D(C00), ALP-TL00B 8.0.0.118D(C01), BLA-AL00B 8.0.0.118D(C00), BLA-L09C 8.0.0.127(C432), 8.0.0.128(C432), 8.0.0.137(C432), BLA-L29C 8.0.0.129(C432), 8.0.0.137(C432) have an authentication bypass vulnerability. When the attacker obtains the user's smartphone, the vulnerability can be used to replace the start-up program so that the attacker can obtain the information in the smartphone and achieve the purpose of controlling the smartphone. plural Huawei Smartphones have authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ALP-AL00B\\BLA-AL00B is a smartphone launched by Huawei
VAR-201811-0916 CVE-2018-6909 Green Electronics RainMachine Mini-8 and Touch HD 12 Input validation vulnerability CVSS V2: 4.3
CVSS V3: 6.5
Severity: MEDIUM
A missing X-Frame-Options header in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application could be used by a remote attacker for clickjacking, as demonstrated by triggering an API page request. Green Electronics RainMachine Mini-8 and Touch HD 12 Contains an input validation vulnerability.Information may be tampered with. The Green Electronics RainMachine Mini-8 is an intelligent irrigation sprinkler. Touch HD 12 Web Application is a web-based touch screen application. An attacker could exploit this vulnerability to implement a clickjacking attack
VAR-201811-0915 CVE-2018-6908 Green Electronics RainMachine Mini-8 and Touch HD 12 Authentication vulnerability CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
An authentication bypass vulnerability exists in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allowing an unauthenticated attacker to perform authenticated actions on the device via a 127.0.0.1:port value in the HTTP 'Host' header, as demonstrated by retrieving credentials. Green Electronics RainMachine Mini-8 and Touch HD 12 Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Green Electronics RainMachine Mini-8 and Touch HD 12 Web Application are products of American C Company. The Green Electronics RainMachine Mini-8 is an intelligent irrigation sprinkler. Touch HD 12 Web Application is a web-based touch screen application
VAR-201811-0914 CVE-2018-6907 Green Electronics RainMachine Mini-8 and Touch HD 12 Web Application Cross-Site Request Forgery Vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
A Cross Site Request Forgery (CSRF) vulnerability in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allows an attacker to control the RainMachine device via the REST API. The Green Electronics RainMachine Mini-8 is an intelligent irrigation sprinkler. Touch HD 12 Web Application is a web-based touch screen application
VAR-201811-0913 CVE-2018-6906 Green Electronics RainMachine Mini-8 and Touch HD 12 Web Application Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
A persistent Cross Site Scripting (XSS) vulnerability in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allows an attacker to inject arbitrary JavaScript via the REST API. Green Electronics RainMachine Mini-8 and Touch HD 12 Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. The Green Electronics RainMachine Mini-8 is an intelligent irrigation sprinkler. Touch HD 12 Web Application is a web-based touch screen application
VAR-201811-0828 CVE-2018-6012 Green Electronics RainMachine Mini-8 Code injection vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
The 'Weather Service' feature of the Green Electronics RainMachine Mini-8 (2nd generation) allows an attacker to inject arbitrary Python code via the 'Add new weather data source' upload function. Green Electronics RainMachine Mini-8 Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Green Electronics RainMachine Mini-8 is a smart irrigation sprinkler from Green Electronics, USA
VAR-201811-0827 CVE-2018-6011 Green Electronics RainMachine Mini-8 Vulnerabilities related to certificate and password management CVSS V2: 6.8
CVSS V3: 8.1
Severity: HIGH
The time-based one-time-password (TOTP) function in the application logic of the Green Electronics RainMachine Mini-8 (2nd generation) uses the administrator's password hash to generate a 6-digit temporary passcode that can be used for remote and local access, aka a "Use of Password Hash Instead of Password for Authentication" issue. This is exploitable by an attacker who discovers a hash value in the rainmachine-settings.sqlite file. Green Electronics RainMachine Mini-8 Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Green Electronics RainMachine Mini-8 is a smart irrigation sprinkler from Green Electronics, USA. No detailed details of the vulnerability are currently available
VAR-201811-0018 CVE-2018-10587 NetGain Enterprise Manager In OS Command injection vulnerability CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
NetGain Enterprise Manager (EM) is affected by OS Command Injection vulnerabilities in versions before 10.0.57. These vulnerabilities could allow remote authenticated attackers to inject arbitrary code, resulting in remote code execution. NetGainEnterpriseManager (EM) is a plug-and-play hardware IT architecture monitoring and management device developed by NetGainSystems
VAR-201811-0300 CVE-2018-1684 IBM WebSphere MQ Input validation vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
IBM WebSphere MQ 8.0 through 9.1 is vulnerable to a error with MQTT topic string publishing that can cause a denial of service attack. IBM X-Force ID: 145456. IBM WebSphere MQ Contains an input validation vulnerability. Vendors have confirmed this vulnerability IBM X-Force ID: 145456 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. An attacker can exploit this issue to cause a denial-of-service condition
VAR-201811-0102 CVE-2018-17912 Fr. Sauter AG CASE Suite XML External entity injection vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An XXE vulnerability exists in CASE Suite Versions 3.10 and prior when processing parameter entities, which may allow remote file disclosure. CASE Suite Is XML An external entity vulnerability exists.Information may be obtained. Fr. Sauter AG CASE Suite is a software development kit for building automation systems from Swiss company Fr. Sauter AG. Sauter AG CASE Suite 3.10 and earlier. A remote attacker could use this vulnerability to cause a file leak. An attacker can exploit this issue to gain access to sensitive information from the application; this may lead to further attacks
VAR-201811-0495 CVE-2018-3900 Yi Home Camera Buffer error vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
An exploitable code execution vulnerability exists in the QR code scanning functionality of Yi Home Camera 27US 1.8.7.0D. A specially crafted QR Code can cause a buffer overflow, resulting in code execution. An attacker can make the camera scan a QR code to trigger this vulnerability. Alternatively, a user could be convinced to display a QR code from the internet to their camera, which could exploit this vulnerability. Yi Home Camera Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. YiHomeCamera is a globally sold IoT home camera. Yi Home Camera 27US is a network camera product of Yi Technology Company in the United States
VAR-201811-0488 CVE-2018-3947 Yi Home Camera Vulnerable to information disclosure CVSS V2: 4.3
CVSS V3: 8.1
Severity: HIGH
An exploitable information disclosure vulnerability exists in the phone-to-camera communications of Yi Home Camera 27US 1.8.7.0D. An attacker can sniff network traffic to exploit this vulnerability. YiHomeCamera is a globally sold IoT home camera
VAR-201811-0485 CVE-2018-3928 Yi Home Camera Vulnerabilities related to authorization, permissions, and access control CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An exploitable code execution vulnerability exists in the firmware update functionality of Yi Home Camera 27US 1.8.7.0D. A specially crafted set of UDP packets can cause a settings change, resulting in denial of service. An attacker can send a set of packets to trigger this vulnerability. Yi Home Camera Contains vulnerabilities related to authorization, permissions, and access control.Service operation interruption (DoS) There is a possibility of being put into a state. Yi Home Camera is a globally sold IoT home camera
VAR-201811-0496 CVE-2018-3910 Yi Home Camera Command injection vulnerability CVSS V2: 5.4
CVSS V3: 8.0
Severity: HIGH
An exploitable code execution vulnerability exists in the cloud OTA setup functionality of Yi Home Camera 27US 1.8.7.0D. A specially crafted SSID can cause a command injection, resulting in code execution. An attacker can cause a camera to connect to this SSID to trigger this vulnerability. Alternatively, an attacker can convince a user to connect their camera to this SSID. Yi Home Camera Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. YiHomeCamera is a globally sold IoT home camera. Yi Home Camera 27US is a network camera product of Yi Technology Company in the United States
VAR-201811-0092 CVE-2018-17922 Circontrol CirCarLife Vulnerabilities related to certificate and password management CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
Circontrol CirCarLife all versions prior to 4.3.1, the PAP credentials of the device are stored in clear text in a log file that is accessible without authentication. Circontrol CirCarLife Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Circontrol CirCarLife is prone to the following multiple security vulnerabilities: 1. An authentication-bypass vulnerability 2. An information-disclosure vulnerability An attacker can exploit these issues to bypass the authentication mechanism and perform unauthorized actions, or to obtain sensitive information. Versions prior to CirCarLife 4.3.1 are vulnerable. CIRCONTROL CirCarLife is a parking lot automation management system developed by Spain CIRCONTROL company
VAR-201811-0106 CVE-2018-17918 Circontrol CirCarLife Authentication vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Circontrol CirCarLife all versions prior to 4.3.1, authentication to the device can be bypassed by entering the URL of a specific page. Circontrol CirCarLife Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CIRCONTROL CirCarLife is a set of parking lot automation management system of Spain CIRCONTROL company. CIRCONTROL CirCarLife Prior to version 4.3.1 there were security vulnerabilities. An authentication-bypass vulnerability 2
VAR-201811-0982 CVE-2018-7356 ZTE ZXR10 8905E Vulnerabilities related to security functions in products CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
All versions up to V3.03.10.B23P2 of ZTE ZXR10 8905E product are impacted by TCP Initial Sequence Number (ISN) reuse vulnerability, which can generate easily predictable ISN, and allows remote attackers to spoof connections. ZTE ZXR10 8905E The product contains vulnerabilities related to security functions.Information may be tampered with. ZTEZXR108905E is a router product of China ZTE Corporation. A security vulnerability exists in ZTEZXR108905E3.03.10.B23P2 and earlier. A remote attacker can exploit this vulnerability to perform a spoofing attack
VAR-201812-0630 CVE-2018-7080 Aruba Access point Vulnerabilities related to security functions CVSS V2: 5.4
CVSS V3: 7.5
Severity: HIGH
A vulnerability exists in the firmware of embedded BLE radios that are part of some Aruba Access points. An attacker who is able to exploit the vulnerability could install new, potentially malicious firmware into the AP's BLE radio and could then gain access to the AP's console port. This vulnerability is applicable only if the BLE radio has been enabled in affected access points. The BLE radio is disabled by default. Note - Aruba products are NOT affected by a similar vulnerability being tracked as CVE-2018-16986. Aruba Access point Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Texas Instruments Bluetooth Low Energy Chips are prone to an remote code-execution vulnerability. Successfully exploiting this issue will allow an attackers to execute arbitrary code. Aruba AP-3xx and others are wireless access point devices of Aruba Networks
VAR-201811-1130 No CVE Variety of Tenda product httpd buffer overflow vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
TendaAC7 and others are wireless router products of Tenda. Httpd is one of the HTTP server components. A buffer overflow vulnerability exists in httpd in several Tenda products. An attacker could exploit the vulnerability to cause a denial of service (the return address of the override function).