VARIoT IoT vulnerabilities database
| VAR-201810-1611 | No CVE | Authentication Bypass Vulnerability in Sunell Camera |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The Sunell camera is a camera produced by Shenzhen Jingyang Technology Co., Ltd.
An authentication bypass vulnerability exists in the Sunell camera. Attackers can use the vulnerability to add administrators, modify configurations, and obtain web administrator permissions.
| VAR-201810-1596 | No CVE | Schneider Pelco Sarix Pro camera set program system.download.sd_file has a command injection vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Pelco Sarix Pro is a video surveillance device from Schneider Electric.
Schneider Pelco Sarix Pro camera set program system.download.sd_file has a command injection vulnerability. Attackers can use the vulnerability to execute arbitrary commands in the background through http requests.
| VAR-201810-1602 | No CVE | Cross-site scripting vulnerability in Sunell camera |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Sunell camera is a camera produced by Shenzhen Jingyang Technology Co., Ltd.
There is a cross-site scripting attack on the Sunell camera. The attacker can use the vulnerability to obtain the administrator's account password by sending a network request.
| VAR-201810-1608 | No CVE | Buffer Overflow Vulnerability in Sunell Camera |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The Sunell camera is a camera produced by Shenzhen Jingyang Technology Co., Ltd.
A buffer overflow vulnerability exists in the Sunell camera, which can be exploited by an attacker to cause a denial of service.
| VAR-201810-1620 | No CVE | Schneider Pelco Sarix Pro camera snap.cgi has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Pelco Sarix Pro is a video surveillance device from Schneider Electric.
Schneider Pelco Sarix Pro camera snap.cgi has an unauthorized access vulnerability. The vulnerability stems from the failure to verify the permissions of the snap.cgi interface. Attackers can use the vulnerability to cause unauthorized access and view real-time monitoring screenshot information.
| VAR-201810-1616 | No CVE | Schneider Pelco Sarix Pro camera set program system.delete.sd_file has arbitrary file deletion vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Pelco Sarix Pro is a video surveillance device from Schneider Electric.
Schneider Pelco Sarix Pro camera set program system.delete.sd_file has an arbitrary file deletion vulnerability. An attacker can use the vulnerability to delete any system file through the http request.
| VAR-201810-1622 | No CVE | Schneider Pelco Sarix Pro camera snapshot.cgi has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Pelco Sarix Pro is a video surveillance device from Schneider Electric.
Schneider Pelco Sarix Pro camera snapshot.cgi has an unauthorized access vulnerability. The vulnerability stems from the failure to verify the permissions of the snapshot.cgi interface. Attackers can use the vulnerability to cause unauthorized access. You can view real-time monitoring screenshot information.
| VAR-201810-0505 | CVE-2018-17591 |
AirTies Air 5343v2 Cross-Site Scripting Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201809-0061 |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
AirTies Air 5343v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. AirTies Air 5343v2 The device software contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. AirTiesAir5343v2 is a wireless router product from Airties, Turkey. A cross-site scripting vulnerability exists in AirTiesAir5343v2. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML by sending a 'productboardtype' parameter to the top.html page
| VAR-201810-0501 | CVE-2018-17587 |
AirTies Air 5750 Device site software cross-site scripting vulnerability
Related entries in the VARIoT exploits database: VAR-E-201809-0061 |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
AirTies Air 5750 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. AirTies Air 5750 The device software contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. AirTiesAir5750 is a wireless router product from Airties, Turkey. A cross-site scripting vulnerability exists in AirTiesAir5750. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML by sending a 'productboardtype' parameter to the top.html page
| VAR-201810-0504 | CVE-2018-17590 |
AirTies Air 5442 Cross-Site Scripting Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201809-0061 |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
AirTies Air 5442 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. AirTies Air 5442 The device software contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. AirTiesAir5442 is a wireless router product from Airties, Turkey. A cross-site scripting vulnerability exists in AirTiesAir5442. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML by sending a 'productboardtype' parameter to the top.html page
| VAR-201810-0502 | CVE-2018-17588 |
AirTies Air 5021 Device site software cross-site scripting vulnerability
Related entries in the VARIoT exploits database: VAR-E-201809-0061 |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
AirTies Air 5021 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. AirTies Air 5021 The device software contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. AirTiesAir5750 is a wireless router product from Airties, Turkey. A cross-site scripting vulnerability exists in AirTiesAir5750. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML by sending a 'productboardtype' parameter to the top.html page
| VAR-201810-0506 | CVE-2018-17593 |
AirTies Air 5453 Cross-Site Scripting Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201809-0061 |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
AirTies Air 5453 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. AirTies Air 5453 A cross-site scripting vulnerability exists in the device software.The information may be obtained and the information may be falsified. AirTiesAir5453 is a wireless router product from Airties, Turkey. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML by sending a 'productboardtype' parameter to the top.html page
| VAR-201810-0507 | CVE-2018-17594 |
AirTies Air 5443v2 Cross-Site Scripting Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201809-0451 |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
AirTies Air 5443v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. AirTies Air 5443v2 The device software contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. AirTiesAir5443v2 is a wireless router product from Airties, Turkey. A cross-site scripting vulnerability exists in AirTiesAir5443v2. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML by sending a 'productboardtype' parameter to the top.html page
| VAR-201809-1343 | No CVE | Konco's small K series smart sockets have unauthorized access vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The control-home smart home uses the advanced wireless technology to upgrade the electrical equipment in the home to achieve various smart scenarios for the whole house. The controller has a variety of smart sockets, designed a variety of functions in a small form factor, coupled with the linkage control APP can be remotely controlled through the network.
There is an unauthorized access vulnerability in the K-K series smart sockets. Attackers can use this vulnerability to gain unauthorized access to gain administrator rights.
| VAR-201810-0503 | CVE-2018-17589 | AirTies Air 5650 Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
AirTies Air 5650 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. AirTies Air 5650 The device software contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. The AirTiesAir5650 is a wireless router product from Airties, Turkey. A cross-site scripting vulnerability exists in AirTiesAir5650. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML by sending a 'productboardtype' parameter to the top.html page
| VAR-201809-1225 | No CVE | Schneider Electric M580PLC Denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Schneider Electric M580 PLC is Schneider Electric's collaborative automation system.
Schneider Electric M580PLC has a denial of service vulnerability. An attacker can cause a PLC to deny service by sending a specific data packet
| VAR-201810-0568 | CVE-2018-15376 | Cisco 800 Series Industrial Integrated Services Routers of Cisco IOS Vulnerability related to the state where arbitrary values can be written to arbitrary locations in software |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in the embedded test subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers could allow an authenticated, local attacker to write arbitrary values to arbitrary locations in the memory space of an affected device. The vulnerability is due to the presence of certain test commands that were intended to be available only in internal development builds of the affected software. An attacker could exploit this vulnerability by using these commands on an affected device. A successful exploit could allow the attacker to write arbitrary values to arbitrary locations in the memory space of the affected device. Cisco 807, 809, and 829 Industrial Integrated ServicesRouter are all Cisco router products. IOS Software is the operating system that Cisco runs for its network devices
| VAR-201810-0567 | CVE-2018-15375 | Cisco 800 Series Industrial Integrated Services Routers of Cisco IOS Vulnerability related to the state where arbitrary values can be written to arbitrary locations in software |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in the embedded test subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers could allow an authenticated, local attacker to write arbitrary values to arbitrary locations in the memory space of an affected device. The vulnerability is due to the presence of certain test commands that were intended to be available only in internal development builds of the affected software. An attacker could exploit this vulnerability by using these commands on an affected device. A successful exploit could allow the attacker to write arbitrary values to arbitrary locations in the memory space of the affected device. Cisco 807, 809, and 829 Industrial Integrated Services Router are router products of Cisco. IOS Software is the operating system that Cisco runs for its network devices
| VAR-201809-1329 | No CVE | Command execution vulnerability in HP Color LaserJet Pro M252 series |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
HP Color LaserJet Pro M252 is a color laser printer manufactured by HP Trading (Shanghai) Co., Ltd.
The HP Color LaserJet Pro M252 series has a command execution vulnerability that could allow an attacker to execute remote commands.
| VAR-201810-0871 | CVE-2018-11064 | Dell EMC Unity OE and UnityVSA OE Permissions vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Dell EMC Unity OE versions 4.3.0.x and 4.3.1.x and UnityVSA OE versions 4.3.0.x and 4.3.1.x contains an Incorrect File Permissions vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability to alter multiple library files in service tools that might result in arbitrary code execution with elevated privileges. No user file systems are directly affected by this vulnerability. Multiple EMC Unity products are prone to local privilege-escalation vulnerability.
The following versions are vulnerable:
EMC Unity Operating Environment 4.3.0.x and 4.3.1.x
EMC UnityVSA Operating Environment 4.3.0.x and 4.3.1.x. UnityVSA is another version of it. This vulnerability may potentially be exploited by malicious local users to compromise the affected system.
Customers can refer to Dell EMC target code information at: https://support.emc.com/docu39695_Target_Revisions_and_Adoption_Rates.pdf?language=en_US&language=en_US.
Link to remedies:
Registered Dell EMC Support customers can download Unity software from the EMC Online Support web site.
https://support.emc.com/downloads/39949_Dell-EMC-Unity-Family
Severity Rating
For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
Legal Information
Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC distributes Dell EMC Security Advisories, in order to bring to the attention of users of the affected Dell EMC products, important security information. Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of bus
iness profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.
Dell EMC Product Security Incident Response Team
secure@dell.com
http://www.emc.com/products/security/product-security-response-center.htm
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=2Ioq
-----END PGP SIGNATURE-----