VARIoT IoT vulnerabilities database
| VAR-201812-0346 | CVE-2018-13815 | SIMATIC S7-1200 and SIMATIC S7-1500 Vulnerable to resource exhaustion |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability has been identified in SIMATIC S7-1200 (All versions), SIMATIC S7-1500 (All Versions < V2.6). An attacker could exhaust the available connection pool of an affected device by opening a sufficient number of connections to the device. Successful exploitation requires an attacker to be able to send packets to port 102/tcp of the affected device. No user interaction and no user privileges are required to exploit the vulnerability. The vulnerability, if exploited, could cause a Denial-of-Service condition impacting the availability of the system. At the time of advisory publication no public exploitation of this vulnerability was known. SIMATIC S7-1200 and SIMATIC S7-1500 Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Siemens SIMATIC S7-1200 and SIMATIC S7-1500 are programmable logic controllers (PLCs) from Siemens AG in small and medium-sized automation systems. Siemens SIMATIC S7 is prone to a denial-of-service vulnerability.
Remote attackers may exploit this issue to cause denial-of-service conditions, denying service to legitimate users
| VAR-201811-0444 | CVE-2018-2476 | SAP NetWeaver Open redirect vulnerability |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
Due to insufficient URL Validation in forums in SAP NetWeaver versions 7.30, 7.31, 7.40, an attacker can redirect users to a malicious site. SAP NetWeaver Contains an open redirect vulnerability.Information may be obtained and information may be altered. SAP NetWeaver is prone to open-redirection vulnerability
An attacker can leverage this issue by constructing a crafted URI and enticing a user to follow it. When an unsuspecting victim follows the link, they may be redirected to an attacker-controlled site; this may aid in phishing attacks. Other attacks are possible
| VAR-201811-0478 | CVE-2018-8416 | .NET Core Vulnerabilities to be tampered with |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A tampering vulnerability exists when .NET Core improperly handles specially crafted files, aka ".NET Core Tampering Vulnerability." This affects .NET Core 2.1.
Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. This may lead to other attacks. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: .NET Core on Red Hat Enterprise Linux security update
Advisory ID: RHSA-2018:3676-01
Product: .NET Core on Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2018:3676
Issue date: 2018-11-27
CVE Names: CVE-2018-8416
====================================================================
1. Summary:
An update for rh-dotnet21-dotnet is now available for .NET Core on Red Hat
Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. It implements a subset of the
.NET framework APIs and several new APIs, and it includes a CLR
implementation.
Security Fix(es):
* .NET Core: Arbitrary file and directory creation (CVE-2018-8416)
For more information, please refer to the upstream docs in the References
section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnet21-dotnet-2.1.500-5.el7.src.rpm
x86_64:
rh-dotnet21-dotnet-2.1.500-5.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.500-5.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.6-5.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.6-5.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.500-5.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.500-5.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnet21-dotnet-2.1.500-5.el7.src.rpm
x86_64:
rh-dotnet21-dotnet-2.1.500-5.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.500-5.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.6-5.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.6-5.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.500-5.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.500-5.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnet21-dotnet-2.1.500-5.el7.src.rpm
x86_64:
rh-dotnet21-dotnet-2.1.500-5.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.500-5.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.6-5.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.6-5.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.500-5.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.500-5.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2018-8416
https://access.redhat.com/security/updates/classification/#moderate
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8416
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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i2VD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201811-0477 | CVE-2018-8415 | plural Microsoft Windows Product and PowerShell Core Vulnerabilities to be tampered with |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
A tampering vulnerability exists in PowerShell that could allow an attacker to execute unlogged code, aka "Microsoft PowerShell Tampering Vulnerability." This affects Windows 7, PowerShell Core 6.1, Windows Server 2012 R2, Windows RT 8.1, PowerShell Core 6.0, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. plural Microsoft Windows Product and PowerShell Core Contains a vulnerability that can be tampered with. The vendor Microsoft PowerShell Has been disclosed as "Tampering Vulnerability".An attacker could execute code that is not logged. Microsoft Powershell is prone to a security bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions
| VAR-201811-0470 | CVE-2018-8256 | plural Microsoft Windows Product Remote Code Execution Vulnerability |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files, aka "Microsoft PowerShell Remote Code Execution Vulnerability." This affects Windows RT 8.1, PowerShell Core 6.0, Microsoft.PowerShell.Archive 1.2.2.0, Windows Server 2016, Windows Server 2012, Windows Server 2008 R2, Windows Server 2019, Windows 7, Windows Server 2012 R2, PowerShell Core 6.1, Windows 10 Servers, Windows 10, Windows 8.1. Vendors have identified this vulnerability as " Microsoft PowerShell Is a remote code execution vulnerability.The code could be executed remotely.
Successfully exploiting this issue may result in the execution of arbitrary code in the context of the affected system. Failed exploit attempts will likely result in denial-of-service conditions
| VAR-201811-0542 | CVE-2018-3635 | Intel Rapid Store Technology Input validation vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Insufficient input validation in installer in Intel Rapid Store Technology (RST) before version 16.7 may allow an unprivileged user to potentially elevate privileges or cause an installer denial of service via local access. Intel Rapid Storage Technology is prone to a local privilege-escalation vulnerability.
An attackers may exploit this issue to gain elevated privileges.
Versions prior to Intel Rapid Storage Technology 16.7 are vulnerable
| VAR-201811-0541 | CVE-2018-3621 | Intel Driver & Support Assistant Vulnerable to information disclosure |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
Insufficient input validation in the Intel Driver & Support Assistant before 3.6.0.4 may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
Attackers can exploit this issue to obtain potentially sensitive information. This may lead to further attacks. This tool is mainly used to get the latest applications provided by Intel
| VAR-201811-0482 | CVE-2018-3698 | Intel Ready Mode Technology Vulnerabilities in authorization, authority and access control |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper file permissions in the installer for the Intel Ready Mode Technology may allow an unprivileged user to potentially gain privileged access via local access. Intel Ready Mode Technology is prone to an insecure file-permissions vulnerability.
A local attacker can exploit this issue to gain elevated privileges on an affected system
| VAR-201811-0481 | CVE-2018-3697 | Intel Media Server Studio Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper directory permissions in the installer for the Intel Media Server Studio may allow unprivileged users to potentially enable an escalation of privilege via local access. Intel Media Server Studio is prone to a local privilege-escalation vulnerability.
A local attacker can exploit this issue to execute arbitrary code with administrative privileges.
Intel Media Server Studio versions prior to 2019 Beta Release are vulnerable. The product supports functions such as video encoding/decoding, audio encoding/decoding, and video filtering
| VAR-201811-0480 | CVE-2018-3696 | Windows for Intel RAID Web Console 3 Authentication vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Authentication bypass in the Intel RAID Web Console 3 for Windows before 4.186 may allow an unprivileged user to potentially gain administrative privileges via local access.
Successfully exploiting this issue can allow an attacker to obtain sensitive information that may aid in launching further attacks
| VAR-201811-0483 | CVE-2018-3699 | Windows for Intel RAID Web Console v3 Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting in the Intel RAID Web Console v3 for Windows may allow an unauthenticated user to elevate privilege via remote access.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to perform unauthorized actions such as reading, modifying, or deleting content, or inject malicious content. A remote attacker could exploit this vulnerability to elevate privileges
| VAR-201811-0107 | CVE-2018-1792 | IBM WebSphere MQ Code injection vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
IBM WebSphere MQ 8.0.0.0 through 8.0.0.10, 9.0.0.0 through 9.0.0.5, 9.0.1 through 9.0.5, and 9.1.0.0 could allow a local user to inject code that could be executed with root privileges. IBM X-Force ID: 148947. Vendors have confirmed this vulnerability IBM X-Force ID: 148947 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state.
An attackers may exploit these issues to execute arbitrary-code with root privileges
| VAR-201811-1124 | No CVE | Multiple vulnerabilities in the Cradlepoint Router |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Cradlepoint is the industry leader in 4G/LTE network modems and routers, providing the highest level of solution for enterprise 4G/LTD/Wi-Fi wireless networks and providing management services to ensure optimal network uptime . There are multiple vulnerabilities in CradlepointRouter. The attacker uses hard-coded backdoor credentials to reveal sensitive information such as the WLAN MAC of the target device, while the default password of the Cradlepoint router is four bytes after the WLAN MAC. If the user does not modify the default password, the attacker can use the default password to log in to the device's web management interface and perform a series of malicious operations, including executing commands in the sandbox, enabling SSH services, and so on.
| VAR-201901-0603 | CVE-2018-15517 |
D-Link Central WiFiManager CWM-100 Server-side request forgery vulnerability in devices
Related entries in the VARIoT exploits database: VAR-E-201811-0492 |
CVSS V2: 5.0 CVSS V3: 8.6 Severity: HIGH |
The MailConnect feature on D-Link Central WiFiManager CWM-100 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, leading to SSRF, as demonstrated by an index.php/System/MailConnect/host/127.0.0.1/port/22/secure/ URI. D-Link Central WiFiManager CWM-100 The device contains a server-side request forgery vulnerability.Information may be tampered with. D-LINKCentralWifiManagerCWM-100 is D-LINK centralized wireless management software. Attackers can exploit this vulnerability to perform port scanning
| VAR-201901-0600 | CVE-2018-15516 |
D-Link Central WiFiManager Server-side request forgery vulnerability in devices
Related entries in the VARIoT exploits database: VAR-E-201811-0327 |
CVSS V2: 3.5 CVSS V3: 5.8 Severity: MEDIUM |
The FTP service on D-Link Central WiFiManager CWM-100 1.03 r0098 devices allows remote attackers to conduct a PORT command bounce scan via port 8000, resulting in SSRF. D-Link Central WiFiManager (CWM-100) The device contains a server-side request forgery vulnerability.Information may be obtained. D-LINKCentralWifiManagerCWM-100 is D-LINK centralized wireless management software. The FTP server component of D-LINKCentral WifiManager can be used as a middleman machine, allowing PORTCommand bounce scanning attacks. FTP Server is one of the FTP (File Transfer Protocol) servers
| VAR-201901-0599 | CVE-2018-15515 |
D-Link Central WiFiManager CWM-100 Vulnerabilities related to authorization, authority, and access control in devices
Related entries in the VARIoT exploits database: VAR-E-201811-0279 |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
The CaptivelPortal service on D-Link Central WiFiManager CWM-100 1.03 r0098 devices will load a Trojan horse "quserex.dll" from the CaptivelPortal.exe subdirectory under the D-Link directory, which allows unprivileged local users to gain SYSTEM privileges. D-Link Central WiFiManager CWM-100 Devices have vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LINKCentralWifiManagerCWM-100 is D-LINK centralized wireless management software. The D-LinkCentral WiFi Manager CWM-1001.03r0098 device will load the Trojan horse \"quserex.dll\" and will create a new thread that runs the integrity of the SYSTEM
| VAR-201812-0360 | CVE-2018-17246 | Kibana Command injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. Kibana Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ElasticsearchKibana (formerly known as elasticsearch-dashboard) is an open source, browser-based analytics and search Elasticsearch dashboard tool from Elasticsearch, the Netherlands. Console is one of the console plugins. Kibana is prone to a local file-include vulnerability. This may allow the attacker to compromise the application and the computer; other attacks are also possible.
The following versions of product are vulnerable:
Kibana 5.0 through 5.5.12 are vulnerable.
Kibana 6.0 through 6.4.2 are vulnerable
| VAR-201811-0038 | CVE-2018-15772 | Dell EMC RecoverPoint and RecoverPoint for VMs Vulnerable to resource exhaustion |
CVSS V2: 3.6 CVSS V3: 7.1 Severity: HIGH |
Dell EMC RecoverPoint versions prior to 5.1.2.1 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an uncontrolled resource consumption vulnerability. A malicious boxmgmt user may potentially be able to consume large amount of CPU bandwidth to make the system slow or to determine the existence of any system file via Boxmgmt CLI. Dell EMC RecoverPoint are prone to an information-disclosure vulnerability and a denial-of-service vulnerability.
Successfully exploiting these issues may allow an attacker to obtain sensitive information or to consume excessive resources, resulting in a denial of service. The former is a set of disaster recovery and data protection software, and the latter is a set of disaster recovery solutions for VMware environments.
Link to remedies:
Customers can download software from: https://support.emc.com/search/?text=RecoverPoint&searchLang=en_US&facetResource=DOWN
Credits:
Dell EMC would like to thank Paul Taylor (@bao7uo) for reporting these vulnerabilities.
Severity Rating
For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
Legal Information
Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of bus
iness profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.
-----BEGIN PGP SIGNATURE-----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=s3w/
-----END PGP SIGNATURE-----
| VAR-201811-0885 | CVE-2018-19204 | PRTG Network Monitor Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
PRTG Network Monitor before 18.3.44.2054 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS commands with system privileges. When creating an HTTP Advanced Sensor, the user's input in the POST parameter 'proxyport_' is mishandled. The attacker can craft an HTTP request and override the 'writeresult' command-line parameter for HttpAdvancedSensor.exe to store arbitrary data in an arbitrary place on the file system. For example, the attacker can create an executable file in the \Custom Sensors\EXE directory and execute it by creating EXE/Script Sensor. PRTG Network Monitor Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
| VAR-201811-0674 | CVE-2018-19148 | Caddy Vulnerable to information disclosure |
CVSS V2: 4.3 CVSS V3: 3.7 Severity: LOW |
Caddy through 0.11.0 sends incorrect certificates for certain invalid requests, making it easier for attackers to enumerate hostnames. Specifically, when unable to match a Host header with a vhost in its configuration, it serves the X.509 certificate for a randomly selected vhost in its configuration. Repeated requests (with a nonexistent hostname in the Host header) permit full enumeration of all certificates on the server. This generally permits an attacker to easily and accurately discover the existence of and relationships among hostnames that weren't meant to be public, though this information could likely have been discovered via other methods with additional effort. Caddy Contains an information disclosure vulnerability.Information may be obtained