VARIoT IoT vulnerabilities database
| VAR-201810-0911 | CVE-2018-15315 | F5 BIG-IP Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
On F5 BIG-IP 13.0.0-13.1.1.1 and 12.1.0-12.1.3.6, there is a reflected Cross Site Scripting (XSS) vulnerability in an undisclosed Configuration Utility page. F5 BIG-IP Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
| VAR-201810-0964 | CVE-2018-12674 | SV3C HD Camera Vulnerabilities related to certificate and password management |
CVSS V2: 2.9 CVSS V3: 5.7 Severity: MEDIUM |
The SV3C HD Camera (L-SERIES V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B) stores the username and password within the cookies of a session. If an attacker gained access to these session cookies, it would be possible to gain access to the username and password of the logged-in account. SV3CL-SERIESHDCAMERA is a network camera product of China SV3C Technology Corporation. A security vulnerability exists in the SV3CL-SERIESHDCAMERAV2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B versions, which are caused by the program passing sensitive information in clear text. There is a security vulnerability in SV3C L-SERIES HD CAMERA V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B
| VAR-201810-0898 | CVE-2018-15312 | F5 BIG-IP Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
On F5 BIG-IP 13.0.0-13.1.1.1 and 12.1.0-12.1.3.6, a reflected Cross-Site Scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an authenticated user to execute JavaScript for the currently logged-in user. F5 BIG-IP Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. F5BIG-IP is an all-in-one network device that integrates network traffic management, application security management, load balancing and other functions
| VAR-201810-0959 | CVE-2018-12669 | SV3C L-SERIES HD CAMERA Authorization vulnerabilities in devices |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
SV3C L-SERIES HD CAMERA V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B devices allow remote authenticated users to reset arbitrary accounts via a request to web/cgi-bin/hi3510/param.cgi. SV3C L-SERIES HD CAMERA The device contains an authorization vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SV3C L-SERIES HD CAMERA is a network camera product of China SV3C Technology Company. There are security vulnerabilities in SV3C L-SERIES HD CAMERA versions 2.3.4.2103-S50-NTD-B20170508B and 2.3.4.2103-S50-NTD-B20170823B
| VAR-201810-0712 | CVE-2018-18391 | Moxa ThingsPro IIoT Gateway and Device Management Software Solutions Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
User Privilege Escalation in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.
There are security vulnerabilities in Moxa ThingsPro version 2.1. A remote attacker could use this vulnerability to gain higher permissions
| VAR-201810-0714 | CVE-2018-18393 | Moxa ThingsPro IIoT Gateway and Device Management Software Solutions Vulnerabilities related to certificate and password management \ |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
Password Management Issue in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.
There are security vulnerabilities in Moxa ThingsPro version 2.1. A remote attacker could use this vulnerability to change a user's password
| VAR-201810-0711 | CVE-2018-18390 | Moxa ThingsPro IIoT Gateway and Device Management Software Solutions Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
User Enumeration in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.
There are security vulnerabilities in Moxa ThingsPro version 2.1. A remote attacker could exploit this vulnerability to obtain a valid user password by implementing a brute-force attack
| VAR-201810-0713 | CVE-2018-18392 | Moxa ThingsPro IIoT Gateway and Device Management Software Solutions Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Privilege Escalation via Broken Access Control in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.
There are security vulnerabilities in Moxa ThingsPro version 2.1. A remote attacker could use this vulnerability to elevate privileges
| VAR-201810-0715 | CVE-2018-18394 | Moxa ThingsPro IIoT Gateway and Device Management Software Solutions Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
Sensitive Information Stored in Clear Text in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1. An attacker could use this vulnerability to recover an access token
| VAR-201810-0717 | CVE-2018-18396 | Moxa ThingsPro IIoT Gateway and Device Management Software Solutions Command injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Remote Code Execution in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.
There are security vulnerabilities in Moxa ThingsPro version 2.1. A remote attacker could exploit this vulnerability to execute arbitrary code by injecting a command string
| VAR-201810-0960 | CVE-2018-12670 | SV3C L-SERIES HD CAMERA Operating System Command Injection Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
SV3C L-SERIES HD CAMERA V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B devices allow OS Command Injection. SV3C L-SERIES HD CAMERA The device includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SV3CL-SERIESHDCAMERA is a network camera product of China SV3C Technology Corporation. An operating system command injection vulnerability exists in the SV3CL-SERIESHDCAMERAV2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B versions due to the program's failure to detect user input. An attacker could exploit this vulnerability to execute arbitrary commands on an affected system
| VAR-201810-0958 | CVE-2018-12668 | SV3C L-SERIES HD CAMERA Vulnerabilities related to the use of hard-coded credentials on devices |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
SV3C L-SERIES HD CAMERA V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B devices have a Hard-coded Password. SV3C L-SERIES HD CAMERA The device contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SV3C L-SERIES HD CAMERA is a network camera product of China SV3C Technology Company. There is a security vulnerability in SV3C L-SERIES HD CAMERA version 2.3.4.2103-S50-NTD-B20170508B and version 2.3.4.2103-S50-NTD-B20170823B. The vulnerability is due to the use of hard-coded passwords in the program. A remote attacker could exploit this vulnerability to gain root privileges on an affected device
| VAR-201810-0716 | CVE-2018-18395 | Moxa ThingsPro IIoT Gateway and Device Management Software Solutions Access control vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Hidden Token Access in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.
There are security vulnerabilities in Moxa ThingsPro version 2.1. A remote attacker could exploit this vulnerability with the help of a hidden API token to gain root privileges and execute arbitrary code
| VAR-201810-0899 | CVE-2018-15313 | F5 BIG-IP AFM Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
On F5 BIG-IP AFM 13.0.0-13.1.1.1 and 12.1.0-12.1.3.6, there is a Reflected Cross Site Scripting vulnerability in undisclosed TMUI page.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. F5 BIG-IP AFM is an advanced firewall product used to protect against DDos attacks from F5 Corporation of the United States. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML
| VAR-201810-0910 | CVE-2018-15314 | F5 BIG-IP AFM Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
On F5 BIG-IP AFM 13.0.0-13.1.1.1 and 12.1.0-12.1.3.6, there is a Reflected Cross Site Scripting vulnerability in undisclosed TMUI page.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. F5 BIG-IP AFM is an advanced firewall product used to protect against DDos attacks from F5 Corporation of the United States. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML
| VAR-201810-1610 | No CVE | MSTAR Set-Top BOX Command Injection Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
MSTAR is a set top box. There is a command injection vulnerability in MSTARSet-TopBOX. An attacker can exploit the vulnerability to execute arbitrary commands.
| VAR-201810-0672 | CVE-2018-1822 | IBM FlashSystem 900 Authentication vulnerabilities in products |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
IBM FlashSystem 900 product GUI allows a specially crafted attack to bypass the authentication requirements of the system, resulting in the ability to remotely change the superuser password. This can be used by an attacker to gain administrative control or to deny service. IBM X-Force ID: 150296. IBM FlashSystem 900 The product contains authentication vulnerabilities. Vendors have confirmed this vulnerability IBM X-Force ID: 150296 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. are all enterprise-level storage solutions of IBM Corporation in the United States. The solution provides a full set of disaster recovery tools (including snapshot, clone and replication) to protect data security and use IBM Virtual Storage Center to realize virtualization configuration and performance management. GUI is one of the Graphical User Interfaces. The following products are affected: IBM FlashSystem 840 MTMs 9840-AE1; FlashSystem 840 MTMs 9843-AE1; FlashSystem 900 MTMs 9840-AE2; FlashSystem 900 MTMs 9840-AE29843-AE2
| VAR-201810-0912 | CVE-2018-15316 | plural F5 Vulnerabilities related to security functions in products |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
In F5 BIG-IP APM 13.0.0-13.1.1.1, APM Client 7.1.5-7.1.6, and/or Edge Client 7101-7160, the BIG-IP APM Edge Client component loads the policy library with user permission and bypassing the endpoint checks. Multiple F5 BIG-IP Products are prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Edge Client is an integrated remote access client used in BIG-IP solutions. A local attacker could exploit this vulnerability to bypass endpoint detection
| VAR-201811-0100 | CVE-2018-17907 | OMRON CX-Supervisor Multiple vulnerabilities in |
CVSS V2: 4.3 CVSS V3: 4.5 Severity: MEDIUM |
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Buffer overflow (CWE-119) - CVE-2018-17905 Processing a specially crafted project file causes memory corruption * * Read out of bounds (CWE-125) - CVE-2018-17907 Reading out-of-array values by processing a specially crafted project file * * Use of freed memory (Use-after-free) (CWE-416) - CVE-2018-17909 Processing arbitrary crafted project files results in arbitrary code execution * * Bad type conversion or cast (Incorrect Type Conversion or Cast) (CWE-704) - CVE-2018-17913 Processing arbitrary crafted project files results in arbitrary code executionA remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of SCS files. By manipulating a document's elements an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. The Omron CX-Supervisor is a visual machine controller from Omron, Japan. Omron CX-Supervisor is prone to the following security vulnerabilities:
1. Multiple remote code-execution vulnerabilities
2. A memory-corruption vulnerability
3
| VAR-201811-0098 | CVE-2018-17905 | OMRON CX-Supervisor Multiple vulnerabilities in |
CVSS V2: 6.8 CVSS V3: 4.5 Severity: Medium |
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Buffer overflow (CWE-119) - CVE-2018-17905 Processing a specially crafted project file causes memory corruption * * Read out of bounds (CWE-125) - CVE-2018-17907 Reading out-of-array values by processing a specially crafted project file * * Use of freed memory (Use-after-free) (CWE-416) - CVE-2018-17909 Processing arbitrary crafted project files results in arbitrary code execution * * Bad type conversion or cast (Incorrect Type Conversion or Cast) (CWE-704) - CVE-2018-17913 Processing arbitrary crafted project files results in arbitrary code executionA remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Supervisor is prone to the following security vulnerabilities:
1. Multiple remote code-execution vulnerabilities
2. A memory-corruption vulnerability
3. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. A buffer error vulnerability exists in Omron CX-Supervisor 3.4.1.0 and earlier