VARIoT IoT vulnerabilities database

VAR-201807-0223 | CVE-2017-5693 | Intel Puma Vulnerabilities related to resource depletion in Japanese firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletion or timeout, which allows a network attacker to create a denial of service via crafted network traffic. Intel Puma Vulnerabilities exist in vulnerabilities related to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Intel Puma is prone to a denial-of-service vulnerability.
Attackers can exploit this issue to cause denial-of-service condition, denying service to legitimate users.
The following versions are affected:
Intel Puma 5 Chipset
Intel Puma 6 SoC
Intel Puma 7 SoC. Intel Puma 5, 6 and 7 Series are different series of modem chip products of Intel Corporation of the United States
VAR-201808-0131 | CVE-2017-5692 | Intel Graphics Driver Vulnerable to out-of-bounds reading |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Out-of-bounds read condition in older versions of some Intel Graphics Driver for Windows code branches allows local users to perform a denial of service attack. Intel Graphics Driver Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Intel Graphics Driver is prone to a denial-of-service vulnerability.
Attackers can exploit this issue to cause denial-of-service condition, denying service to legitimate users. The following versions are affected: Intel Graphics Driver version 15.45 (SKL and KBL), version 15.40 (Windows 7, 8.1, 10), version 15.36 (HSW systems using Windows 7, 8.1)
VAR-201807-2196 | CVE-2018-5544 | F5 BIG-IP APM Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
When the F5 BIG-IP APM 13.0.0-13.1.1 or 12.1.0-12.1.3 renders certain pages (pages with a logon agent or a confirm box), the BIG-IP APM may disclose configuration information such as partition and agent names via URI parameters. F5 BIG-IP APM Contains an information disclosure vulnerability.Information may be obtained. F5 BIG-IP APM is prone to an information-disclosure vulnerability.
Successfully exploiting this issue may allow attackers to obtain sensitive information. This may lead to other attacks. F5 BIG-IP Access Policy Manager (APM) is a set of access and security solutions from F5 Corporation of the United States. The solution provides unified access to business-critical applications and networks
VAR-201807-2195 | CVE-2018-5543 | F5 BIG-IP Controller Vulnerabilities related to certificate and password management |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
The F5 BIG-IP Controller for Kubernetes 1.0.0-1.5.0 (k8s-bigip-crtl) passes BIG-IP username and password as command line parameters, which may lead to disclosure of the credentials used by the container. F5 BIG-IP Controller Contains a vulnerability related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5 Container Connector is prone to an information-disclosure vulnerability.
Successful exploits may allow an attacker to obtain sensitive information that may lead to further attacks. Failed exploit attempts will result in a denial of service condition. F5 BIG-IP Controller for Kubernetes is a management controller for dynamically creating, managing and destroying BIG-IP objects from F5 Corporation in the United States. An attacker could exploit the vulnerability to disclose the credentials used by the container
VAR-201808-0596 | CVE-2018-11050 | Dell EMC NetWorker Vulnerabilities related to certificate and password management |
CVSS V2: 3.3 CVSS V3: 8.8 Severity: HIGH |
Dell EMC NetWorker versions between 9.0 and 9.1.1.8 through 9.2.1.3, and the version 18.1.0.1 contain a Clear-Text authentication over network vulnerability in the Rabbit MQ Advanced Message Queuing Protocol (AMQP) component. User credentials are sent unencrypted to the remote AMQP service. An unauthenticated attacker in the same network collision domain, could potentially sniff the password from the network and use it to access the component using the privileges of the compromised user. Dell EMC NetWorker Contains vulnerabilities related to certificate and password management and vulnerabilities related to cryptography.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Dell EMC NetWorker is prone to a security bypass vulnerability.
An attacker can exploit this issue to perform man-in-the-middle attacks and certain unauthorized actions, which will aid in further attacks.
The following product are affected:
Dell EMC NetWorker 9.0
Dell EMC NetWorker 9.1.1.8 and prior
Dell EMC NetWorker 9.2.1.3 and prior
Dell EMC NetWorker 18.1.0.1. The software provides backup and recovery, deduplication, backup reporting, and more.
Dell EMC recommends all customers upgrade at the earliest opportunity. Customers can download a fixed version directly at the links below.
Link to remedies:
For more information and access to the various releases, see https://support.emc.com/downloads/1095_NetWorker
Severity Rating
For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
Legal Information
Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of bus
iness profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.
Dell EMC Product Security Response Center
security_alert@emc.com
http://www.emc.com/products/security/product-security-response-center.htm
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEazKDH3UU9DEtTDc5dty75+wTzVkFAltYym8ACgkQdty75+wT
zVni7gf+OdRos9pBAxu6Q0HePcbikxSojfZ7lPV7C+v0tm57U6m8tezCMK/Vr2Tp
UjkwvAhCbuYPjauffqaKh2zZ1OgaibbMTp1y3cDtVbvO0rrM0dnKydnpOzTyAI4a
ooKA7OvFrw1qJpmv8zABzv4c9A2+YjBRRMlHX2OFTWei7ZR17Uux+LvBZOpj3/dF
cqSMj8LKxaZBQ/w7F3e8fDxMKazHf422N3Hc/P2mDe4d/GAPovs5yd8Urpl/UHno
V7QhwmRdaxmFf7T/GfFw58ZOEOI2B19K5PLFtLnrgBLAOc+SPvJELyAwJi4W4NFG
ihUimCnuTW6200OY6l+4/AsdJpfEEQ==
=P3D/
-----END PGP SIGNATURE-----
VAR-201808-0903 | CVE-2018-3926 | Samsung SmartThings Hub STH-ETH-250 Firmware integer underflow vulnerability |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: MEDIUM |
An exploitable integer underflow vulnerability exists in the ZigBee firmware update routine of the hubCore binary of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The hubCore process incorrectly handles malformed files existing in its data directory, leading to an infinite loop, which eventually causes the process to crash. An attacker can send an HTTP request to trigger this vulnerability. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. Samsung SmartThings Hub is prone to a denial-of-service vulnerability. Due to the nature of this issue, arbitrary code execution may be possible but this has not been confirmed.
Samsung SmartThings Hub STH-ETH-250 0.20.17 is vulnerable; other versions may also be affected
VAR-201809-1060 | CVE-2018-3873 | Samsung SmartThings Hub STH-ETH-250-Firmware Buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
An exploitable buffer overflow vulnerability exists in the credentials handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250-Firmware version 0.20.17. The strncpy overflows the destination buffer, which has a size of 128 bytes. An attacker can send an arbitrarily long "secretKey" value in order to exploit this vulnerability. Samsung SmartThings Hub STH-ETH-250-Firmware Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. This vulnerability stems from the fact that the video-core process failed to properly extract the fields in the JSON payload controlled by the user
VAR-201808-0916 | CVE-2018-3893 | Samsung SmartThings Hub STH-ETH-250 Firmware buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An exploitable buffer overflow vulnerability exists in the /cameras/XXXX/clips handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability. Samsung SmartThings Hub STH-ETH-250 The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. field
VAR-201809-1071 | CVE-2018-3897 | Samsung SmartThings Hub Buffer error vulnerability in some firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An exploitable buffer overflow vulnerabilities exist in the /cameras/XXXX/clips handler of video-core's HTTP server of Samsung SmartThings Hub with Firmware version 0.20.17. The video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. The strncpy call overflows the destination buffer, which has a size of 52 bytes. An attacker can send an arbitrarily long "callbackUrl" value in order to exploit this vulnerability. Samsung SmartThings Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. field
VAR-201808-0911 | CVE-2018-3872 | Samsung SmartThings Hub STH-ETH-250 - Firmware Buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
An exploitable buffer overflow vulnerability exists in the credentials handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly extracts the videoHostUrl field from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability. Samsung SmartThings Hub STH-ETH-250 - Firmware Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. ### Tested Versions Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17 ### Product URLs [https://www.smartthings.com/products/smartthings-hub](https://www.smartthings.com/products/smartthings-hub) ### CVSSv3 Score 9.9 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H ### CWE CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') ### Details Samsung produces a series of devices aimed at controlling and monitoring a home, such as wall switches, LED bulbs, thermostats and cameras. One of those is the Samsung SmartThings Hub, a central controller which allows an end user to use their..
VAR-201808-0909 | CVE-2018-3866 | Samsung SmartThings Hub STH-ETH-250 - Firmware Buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
An exploitable buffer overflow vulnerability exists in the samsungWifiScan handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. The strcpy at [8] overflows the destination buffer, which has a size of 40 bytes. An attacker can send an arbitrarily long 'callbackUrl' value in order to exploit this vulnerability. Samsung SmartThings Hub STH-ETH-250 - Firmware Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. samsungWifiScanhandler is one of the WiFi network discovery handlers
VAR-201808-0914 | CVE-2018-3880 | Samsung SmartThings Hub STH-ETH-250 - Firmware Buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
An exploitable stack-based buffer overflow vulnerability exists in the database 'find-by-cameraId' functionality of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly handles existing records inside its SQLite database, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability. Samsung SmartThings Hub STH-ETH-250 - Firmware Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers
VAR-201808-0924 | CVE-2018-3909 | Samsung SmartThings Hub STH-ETH-250 In firmware HTTP Request smuggling vulnerability |
CVSS V2: 6.4 CVSS V3: 8.6 Severity: HIGH |
An exploitable vulnerability exists in the REST parser of video-core's HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly handles pipelined HTTP requests, which allows successive requests to overwrite the previously parsed HTTP method, 'onmessagecomplete' callback. An attacker can send an HTTP request to trigger this vulnerability. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. A security vulnerability exists in the REST resolver for the video-coreHTTP server in SamsungSmartThingsHub, which stems from a program failing to properly handle requests that are transmitted in a pipeline
VAR-201808-0922 | CVE-2018-3907 | Samsung SmartThings Hub STH-ETH-250 In firmware HTTP Request smuggling vulnerability |
CVSS V2: 6.4 CVSS V3: 10.0 Severity: CRITICAL |
An exploitable vulnerability exists in the REST parser of video-core's HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly handles pipelined HTTP requests, which allows successive requests to overwrite the previously parsed HTTP method, 'on_url' callback. An attacker can send an HTTP request to trigger this vulnerability. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. A security vulnerability exists in the REST resolver for the video-coreHTTP server in SamsungSmartThingsHub, which stems from a program failing to properly handle requests that are transmitted in a pipeline
VAR-201808-0925 | CVE-2018-3911 | Samsung SmartThings Hub STH-ETH-250 In firmware HTTP Response splitting vulnerability |
CVSS V2: 5.0 CVSS V3: 8.6 Severity: HIGH |
An exploitable HTTP header injection vulnerability exists in the remote servers of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The hubCore process listens on port 39500 and relays any unauthenticated message to SmartThings' remote servers, which insecurely handle JSON messages, leading to partially controlled requests generated toward the internal video-core process. An attacker can send an HTTP request to trigger this vulnerability. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. The vulnerability stems from a program failing to properly process JSON messages
VAR-201808-0893 | CVE-2018-3912 | Samsung SmartThings Hub STH-ETH-250 Firmware buffer error vulnerability |
CVSS V2: 6.9 CVSS V3: 7.8 Severity: HIGH |
On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17, the video-core process insecurely extracts the fields from the "shard" table of its SQLite database, leading to a buffer overflow on the stack. The strcpy call overflows the destination buffer, which has a size of 128 bytes. An attacker can send an arbitrarily long "secretKey" value in order to exploit this vulnerability. Samsung SmartThings Hub STH-ETH-250 The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. A stack buffer overflow vulnerability exists in the retrieval of database fields for the video-coreHTTP server in SamsungSmartThingsHub. Extract fields
VAR-201808-0921 | CVE-2018-3905 | Samsung SmartThings Hub STH-ETH-250 Device firmware buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
An exploitable buffer overflow vulnerability exists in the camera "create" feature of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process incorrectly extracts the "state" field from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability. Samsung SmartThings Hub STH-ETH-250 The device firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. ' field
VAR-201808-0897 | CVE-2018-3919 | Samsung SmartThings Hub STH-ETH-250 Device buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process insecurely extracts the fields from the "clips" table of its SQLite database, leading to a buffer overflow on the stack. An attacker can send a series of HTTP requests to trigger this vulnerability. Samsung SmartThings Hub STH-ETH-250 The device contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers
VAR-201808-0902 | CVE-2018-3925 | Samsung SmartThings Hub STH-ETH-250 Firmware buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
An exploitable buffer overflow vulnerability exists in the remote video-host communication of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process insecurely parses the AWSELB cookie while communicating with remote video-host servers, leading to a buffer overflow on the heap. An attacker able to impersonate the remote HTTP servers could trigger this vulnerability. Samsung SmartThings Hub STH-ETH-250 The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. The vulnerability is caused by the video-core process incorrectly parsing the AWSELB cookie is set
VAR-201808-0913 | CVE-2018-3879 | Samsung SmartThings Hub STH-ETH-250 In the device SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
An exploitable JSON injection vulnerability exists in the credentials handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process incorrectly parses the user-controlled JSON payload, leading to a JSON injection which in turn leads to a SQL injection in the video-core database. An attacker can send a series of HTTP requests to trigger this vulnerability. Samsung SmartThings Hub STH-ETH-250 The device includes SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. An injection vulnerability exists in the credentials-handler of the video-coreHTTP server in SamsungSmartThingsHub. The vulnerability stems from the program not correctly parsing the JSON payload controlled by the user. An attacker can use the vulnerability to execute arbitrary SQL queries in the context of a video-core process by sending an HTTP request to execute arbitrary code