VARIoT IoT vulnerabilities database

VAR-201807-1062 | CVE-2018-13134 |
TP-Link Archer C1200 Cross-Site Scripting Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201812-0034 |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
TP-Link Archer C1200 1.13 Build 2018/01/24 rel.52299 EU devices have XSS via the PATH_INFO to the /webpages/data URI. TP-Link Archer C1200 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. TP-LinkArcherC1200 is a wireless router product of China TP-LINK. A cross-site scripting vulnerability exists in the TP-LinkArcherC12001.13Build2018/01/24rel.52299EU version due to a program failing to filter special characters or illegal input. A remote attacker can use the PATH_INFO to steal the cookie and redirect the user to a malicious website
VAR-201807-1264 | CVE-2018-12571 |
Microsoft Forefront Unified Access Gateway Server-side request forgery vulnerability
Related entries in the VARIoT exploits database: VAR-E-201807-0093 |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
uniquesig0/InternalSite/InitParams.aspx in Microsoft Forefront Unified Access Gateway 2010 allows remote attackers to trigger outbound DNS queries for arbitrary hosts via a comma-separated list of URLs in the orig_url parameter, possibly causing a traffic amplification and/or SSRF outcome. Microsoft Forefront Unified Access Gateway Contains a server-side request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Microsoft Forefront Unified Access Gateway is a Microsoft SSL VPN gateway server. The solution mainly provides application intelligence technology and fine-grained access control functions. A security vulnerability exists in the uniquesig0/InternalSite/InitParams.aspx file in Microsoft Forefront UAG version 2010. A remote attacker could exploit this vulnerability by sending a specially crafted request to perform DNS queries on arbitrary hosts
VAR-201807-2219 | No CVE | Beijing Hollysys LKS Safety FA-AutoThink Has Denial of Service Vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Beijing Hollysys is a provider of automation and information technology solutions. The company's business is concentrated in three areas: industrial automation, rail transportation automation and medical automation.
Beijing Hollysys LKS Safety FA-AutoThink has a denial of service vulnerability. The vulnerability is caused by the GetElement function in Ldmdl.dll failing to process the number of malformed elements 0xf9. An attacker could exploit the vulnerability to cause an assignment null pointer to appear, resulting in a denial of service vulnerability
VAR-201807-1854 | CVE-2018-7781 | Schneider Electric Pelco Sarix Professional 1st generation Vulnerabilities related to authorization, authority, and access control in camera firmware |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, by sending a specially crafted request an authenticated user can view password in clear text and results in privilege escalation. SchneiderElectricPelcoSarixProfessional1stgenerationcameras is an IP camera device from Schneider Electric, France. A security vulnerability exists in Schneider Electric PelcoSarix Professional1stgenerationcameras using firmware prior to 3.29.69
VAR-201807-1853 | CVE-2018-7780 | Schneider Electric Pelco Sarix Professional 1st generation Buffer error vulnerability in camera firmware |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, a buffer overflow vulnerability exist in cgi program "set". SchneiderElectricPelcoSarixProfessional1stgenerationcameras is an IP camera device from Schneider Electric, France. An attacker could exploit the vulnerability to execute arbitrary code or cause a denial of service
VAR-201807-2187 | CVE-2018-4851 | Siemens SICLOCK TC Product Denial of Service Vulnerability |
CVSS V2: 8.5 CVSS V3: 8.2 Severity: HIGH |
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could cause a Denial-of-Service condition by sending certain packets to the device, causing potential reboots of the device. The core functionality of the device could be impacted. The time serving functionality recovers when time synchronization with GPS devices or other NTP servers are completed. SICLOCK TC100 and SICLOCK TC400 Contains an input validation vulnerability.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. The SICROCK product line offers components for synchronizing plant and system time. A denial of service vulnerability exists in the Siemens SICLOCK TC product. A denial-of-Service vulnerability
2. An authentication-bypass vulnerability
3. A remote code-execution vulnerability
4. Multiple security-bypass vulnerabilities
5. An information-disclosure vulnerability
Exploiting these issues could allow an attacker to bypass authentication mechanism, obtain sensitive information, execute arbitrary code and perform unauthorized actions. Failed exploits can result in a denial-of-service condition. Both Siemens SICLOCK TC100 and SICLOCK TC400 are central clock products of Germany's Siemens (Siemens). This product can provide unified and accurate time information for all network nodes in the LAN
VAR-201807-1343 | CVE-2018-11314 | Roku TV Input validation vulnerability |
CVSS V2: 9.3 CVSS V3: 9.6 Severity: CRITICAL |
The External Control API in Roku and Roku TV products allow unauthorized access via a DNS Rebind attack. This can result in remote device control and privileged device and network information to be exfiltrated by an attacker. Roku TV Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Both Roku and Roku TV are smart Internet TV box devices. External Control API is one of the external control interfaces
VAR-201807-2190 | CVE-2018-4854 | SICLOCK TC100 and SICLOCK TC400 Access control vulnerability |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the administrative client stored on the device. If a legitimate user downloads and executes the modified client from the affected device, then he/she could obtain code execution on the client system. SICLOCK TC100 and SICLOCK TC400 Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The SICROCK product line offers components for synchronizing plant and system time. An unauthorized operating vulnerability exists in the Siemens SICLOCK TC product. A denial-of-Service vulnerability
2. An authentication-bypass vulnerability
3. A remote code-execution vulnerability
4. Multiple security-bypass vulnerabilities
5. An information-disclosure vulnerability
Exploiting these issues could allow an attacker to bypass authentication mechanism, obtain sensitive information, execute arbitrary code and perform unauthorized actions. Failed exploits can result in a denial-of-service condition. Both Siemens SICLOCK TC100 and SICLOCK TC400 are central clock products of Germany's Siemens (Siemens). This product can provide unified and accurate time information for all network nodes in the LAN
VAR-201807-2192 | CVE-2018-4856 | SICLOCK TC100 and SICLOCK TC400 Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with administrative access to the device's management interface could lock out legitimate users. Manual interaction is required to restore the access of legitimate users. SICLOCK TC100 and SICLOCK TC400 Contains vulnerabilities related to authorization, permissions, and access control.Service operation interruption (DoS) There is a possibility of being put into a state. The SICROCK product line offers components for synchronizing plant and system time. The Siemens SICLOCK TC product has a bypass certification vulnerability. Siemens SICLOCK TC Devices are prone to the following multiple security vulnerabilities:
1. A denial-of-Service vulnerability
2. An authentication-bypass vulnerability
3. A remote code-execution vulnerability
4. Multiple security-bypass vulnerabilities
5. An information-disclosure vulnerability
Exploiting these issues could allow an attacker to bypass authentication mechanism, obtain sensitive information, execute arbitrary code and perform unauthorized actions. Failed exploits can result in a denial-of-service condition. Both Siemens SICLOCK TC100 and SICLOCK TC400 are central clock products of Germany's Siemens (Siemens). This product can provide unified and accurate time information for all network nodes in the LAN. A security vulnerability exists in Siemens SICLOCK TC100 and SICLOCK TC400
VAR-201807-2191 | CVE-2018-4855 | Siemens SICLOCK TC Product Information Disclosure Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). Unencrypted storage of passwords in the client configuration files and during network transmission could allow an attacker in a privileged position to obtain access passwords. SICLOCK TC100 and SICLOCK TC400 Contains an information disclosure vulnerability.Information may be obtained. The SICROCK product line offers components for synchronizing plant and system time. An information disclosure vulnerability exists in the Siemens SICLOCK TC product. An attacker can exploit the vulnerability to read the device's access password. A denial-of-Service vulnerability
2. An authentication-bypass vulnerability
3. A remote code-execution vulnerability
4. Multiple security-bypass vulnerabilities
5. An information-disclosure vulnerability
Exploiting these issues could allow an attacker to bypass authentication mechanism, obtain sensitive information, execute arbitrary code and perform unauthorized actions. Failed exploits can result in a denial-of-service condition. Both Siemens SICLOCK TC100 and SICLOCK TC400 are central clock products of Germany's Siemens (Siemens). This product can provide unified and accurate time information for all network nodes in the LAN
VAR-201807-1852 | CVE-2018-7779 | plural Schneider Electric Vulnerabilities related to authorization, authority, and access control in products |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In Schneider Electric Wiser for KNX V2.1.0 and prior, homeLYnk V2.0.1 and prior; and spaceLYnk V2.1.0 and prior, weak and unprotected FTP access could allow an attacker unauthorized access. Schneider Electric Wiser for KNX, homeLYnk and spaceLYnk are all automated programming software for different logic controllers from Schneider Electric, France. An attacker could exploit this vulnerability to gain unauthorized access
VAR-201807-0333 | CVE-2018-10596 | Medtronic 2090 CareLink Programmer Vulnerable to information disclosure |
CVSS V2: 5.2 CVSS V3: 8.0 Severity: HIGH |
Medtronic 2090 CareLink Programmer
uses a virtual private network connection to securely download updates. It does not verify it is still connected to this virtual private network before downloading updates. The affected products initially establish an encapsulated IP-based VPN connection to a Medtronic-hosted update network. Once the VPN is established, it makes a request to a HTTP (non-TLS) server across the VPN for updates, which responds and provides any available updates. The programmer-side (client) service responsible for this HTTP request does not check to ensure it is still connected to the VPN before making the HTTP request. Thus, an attacker could cause the VPN connection to terminate (through various methods and attack points) and intercept the HTTP request, responding with malicious updates via a man-in-the-middle attack. The affected products do not verify the origin or integrity of these updates, as it insufficiently relied on the security of the VPN. An attacker with remote network access to the programmer could influence these communications. Medtronic 2090 CareLink Programmer Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Medtronic2090CareLinkProgrammer is a set of portable computer products from Medtronic Corporation of the United States. This product is used to manage and program cardiac devices in the medical industry
VAR-201807-2188 | CVE-2018-4852 | SICLOCK TC100 and SICLOCK TC400 Authentication vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could potentially circumvent the authentication mechanism if he/she is able to obtain certain knowledge specific to the attacked device. SICLOCK TC100 and SICLOCK TC400 Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The SICROCK product line offers components for synchronizing plant and system time. The Siemens SICLOCK TC product has a bypass certification vulnerability. Allows an attacker to read and modify device configuration. Siemens SICLOCK TC Devices are prone to the following multiple security vulnerabilities:
1. A denial-of-Service vulnerability
2. An authentication-bypass vulnerability
3. A remote code-execution vulnerability
4. Multiple security-bypass vulnerabilities
5. Failed exploits can result in a denial-of-service condition. Both Siemens SICLOCK TC100 and SICLOCK TC400 are central clock products of Germany's Siemens (Siemens). This product can provide unified and accurate time information for all network nodes in the LAN. A security vulnerability exists in Siemens SICLOCK TC100 and SICLOCK TC400
VAR-201807-2189 | CVE-2018-4853 | SICLOCK TC100 and SICLOCK TC400 Access control vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the firmware of the device. SICLOCK TC100 and SICLOCK TC400 Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The SICROCK product line offers components for synchronizing plant and system time. An unauthorized operating vulnerability exists in the Siemens SICLOCK TC product. A denial-of-Service vulnerability
2. An authentication-bypass vulnerability
3. A remote code-execution vulnerability
4. Multiple security-bypass vulnerabilities
5. An information-disclosure vulnerability
Exploiting these issues could allow an attacker to bypass authentication mechanism, obtain sensitive information, execute arbitrary code and perform unauthorized actions. Failed exploits can result in a denial-of-service condition. Both Siemens SICLOCK TC100 and SICLOCK TC400 are central clock products of Germany's Siemens (Siemens). This product can provide unified and accurate time information for all network nodes in the LAN
VAR-201807-1344 | CVE-2018-11316 | Sonos wireless speaker Input validation vulnerability |
CVSS V2: 9.3 CVSS V3: 9.6 Severity: CRITICAL |
The UPnP HTTP server on Sonos wireless speaker products allow unauthorized access via a DNS rebinding attack. This can result in remote device control and privileged device and network information to be exfiltrated by an attacker. Sonos wireless speaker Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Sonos wireless speaker is a wireless speaker device of Sonos company in the United States. UPnP HTTP Server is one of the HTTP servers
VAR-201807-1856 | CVE-2018-7783 | Schneider Electric SoMachine Basic In XML External entity vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: High |
Schneider Electric SoMachine Basic prior to v1.6 SP1 suffers from an XML External Entity (XXE) vulnerability using the DTD parameter entities technique resulting in disclosure and retrieval of arbitrary data on the affected node via out-of-band (OOB) attack. The vulnerability is triggered when input passed to the xml parser is not sanitized while parsing the xml project/template file. Schneider Electric SoMachine Basic Has XML An external entity vulnerability exists.Information may be obtained
VAR-201807-0232 | CVE-2017-0913 | Ubiquiti UCRM Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 1.9 CVSS V3: 4.7 Severity: MEDIUM |
Ubiquiti UCRM versions 2.3.0 to 2.7.7 allow an authenticated user to read arbitrary files in the local file system. Note that by default, the local file system is isolated in a docker container. Successful exploitation requires valid credentials to an account with "Edit" access to "System Customization". Ubiquiti UCRM Contains vulnerabilities related to authorization, permissions, and access control.Information may be obtained. Ubiquiti UCRM is a billing and customer management system developed by Ubiquiti Networks. The system has functions such as customer management, automatic settlement and network monitoring
VAR-201807-0343 | CVE-2018-12103 | D-Link DIR-890L A2 Device access control vulnerability |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
An issue was discovered on D-Link DIR-890L with firmware 1.21B02beta01 and earlier, DIR-885L/R with firmware 1.21B03beta01 and earlier, and DIR-895L/R with firmware 1.21B04beta04 and earlier devices (all hardware revisions). Due to the predictability of the /docs/captcha_(number).jpeg URI, being local to the network, but unauthenticated to the administrator's panel, an attacker can disclose the CAPTCHAs used by the access point and can elect to load the CAPTCHA of their choosing, leading to unauthorized login attempts to the access point. D-Link DIR-890L A2 The device contains an access control vulnerability.Information may be tampered with. D-LinkDIR-890L is a wireless router product of D-Link. D-LinkDIR-890LA2 has an improper access control vulnerability. Authorized login attempts the access point. A security vulnerability exists in the D-Link DIR-890L A2. [Suggested description]
An issue was discovered on D-Link DIR-890L A2 devices.
------------------------------------------
[Has vendor confirmed or acknowledged the vulnerability?]
true
------------------------------------------
[Discoverer]
Kevin Randall
VAR-201807-1253 | CVE-2018-1244 | plural Dell iDRAC Command injection vulnerability in the product |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Dell EMC iDRAC7/iDRAC8, versions prior to 2.60.60.60, and iDRAC9 versions prior to 3.21.21.21 contain a command injection vulnerability in the SNMP agent. A remote authenticated malicious iDRAC user with configuration privileges could potentially exploit this vulnerability to execute arbitrary commands on the iDRAC where SNMP alerting is enabled. Dell EMC iDRAC7 , iDRAC8 ,and iDRAC9 Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple Dell EMC Products are prone to remote command-injection vulnerability.
Successfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. This solution provides functions such as remote management, crash recovery and power control for Dell PowerEdge systems
VAR-201807-1252 | CVE-2018-1243 | plural Dell iDRAC Vulnerabilities related to security checks in products |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Dell EMC iDRAC6, versions prior to 2.91, iDRAC7/iDRAC8, versions prior to 2.60.60.60 and iDRAC9, versions prior to 3.21.21.21, contain a weak CGI session ID vulnerability. The sessions invoked via CGI binaries use 96-bit numeric-only session ID values, which makes it easier for remote attackers to perform bruteforce session guessing attacks. plural Dell iDRAC The product contains a security check vulnerability.Information may be obtained. Dell EMC iDRAC6 and others are system management solutions of Dell (Dell), including hardware and software. This solution provides functions such as remote management, crash recovery and power control for Dell PowerEdge systems. Attackers can exploit this vulnerability to perform brute force attacks on user sessions