VARIoT IoT vulnerabilities database
| VAR-201810-0305 | CVE-2018-0430 | Cisco Integrated Management Controller Software Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device. The vulnerability is due to insufficient validation of command input by the affected software. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device. The software supports HTTP, SSH access, etc., and can perform operations such as starting, shutting down and restarting the server
| VAR-201809-1118 | CVE-2018-7939 | plural Huawei Vulnerabilities related to security functions in smartphones |
CVSS V2: 4.9 CVSS V3: 4.6 Severity: MEDIUM |
Huawei smart phones G9 Lite, Honor 5A, Honor 6X, Honor 8 with the versions before VNS-L53C605B120CUSTC605D103, the versions before CAM-L03C605B143CUSTC605D008, the versions before CAM-L21C10B145, the versions before CAM-L21C185B156, the versions before CAM-L21C223B133, the versions before CAM-L21C432B210, the versions before CAM-L21C464B170, the versions before CAM-L21C636B245, the versions before Berlin-L21C10B372, the versions before Berlin-L21C185B363, the versions before Berlin-L21C464B137, the versions before Berlin-L23C605B161, the versions before FRD-L09C10B387, the versions before FRD-L09C185B387, the versions before FRD-L09C432B398, the versions before FRD-L09C636B387, the versions before FRD-L19C10B387, the versions before FRD-L19C432B399, the versions before FRD-L19C636B387 have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can disable the boot wizard by enable the talkback function. As a result, the FRP function is bypassed. plural Huawei Smartphones have security function vulnerabilities.Information may be altered. HuaweiG9Lite and Honor5A are the smartphone products of China's Huawei company. A number of Huawei mobile phones have FRP bypass vulnerabilities. There are security vulnerabilities in many Huawei products
| VAR-201810-0304 | CVE-2018-0426 | plural Cisco Path traversal vulnerability in products |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to the targeted device. A successful exploit could allow the attacker to gain access to arbitrary files on the affected device, resulting in the disclosure of sensitive information. The RV110W is a Wireless-NVPN firewall router. The RV130W is a Wireless-N multi-function VPN router. The RV215W is a Wireless-NVPN router
| VAR-201809-1331 | No CVE | Cisco Network Assistant Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco Network Assistant (CNA) is a Cisco-based Cisco switch graphical interface management tool that can be used to configure Cisco devices such as Catalyst switches, PIX firewalls, IP phones, and wireless access points. It is facing small and medium enterprises. A denial of service vulnerability exists in Cisco Network Assistant. An attacker exploiting this vulnerability could cause a system crash.
| VAR-201809-0467 | CVE-2018-16590 | FURUNO FELCOM 250 and 500 Authentication vulnerabilities in devices |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
FURUNO FELCOM 250 and 500 devices use only client-side JavaScript in login.js for authentication. FURUNO FELCOM 250 and 500 The device contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. FURUNO FELCOM 250 and 500 are shipborne communication equipment of Japan Furuno Electric Company. An authorization issue vulnerability exists in the FURUNO FELCOM 250 and 500 devices. An attacker could exploit this vulnerability to bypass authentication checks and gain access to accounts without a password
| VAR-201810-0336 | CVE-2018-0463 | Cisco Network Services Orchestrator Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the Cisco Network Plug and Play server component of Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to gain unauthorized access to configuration data that is stored on an affected NSO system. The vulnerability exists because the Network Plug and Play component performs incomplete validation when configured to use secure unique device identifiers (SUDI) for authentication. An attacker who controls a Cisco device that supports SUDI authentication and has connectivity to an affected NSO system could exploit this vulnerability. The attacker would need to leverage information about the devices that are being registered on the NSO server to send crafted Cisco Network Plug and Play authentication packets to an affected system. A successful exploit could allow the attacker to gain unauthorized access to configuration data for devices that will be managed by the NSO system. Network Plug and Play server is one of the network plug and play server components
| VAR-201810-0320 | CVE-2018-0445 | Cisco Packaged Contact Center Enterprise Vulnerable to cross-site request forgery |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the web-based management interface of Cisco Packaged Contact Center Enterprise could allow an unauthenticated, remote attacker to conduct a CSRF attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a customized link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. Cisco Packaged Contact Center Enterprise Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Packaged Contact Center Enterprise is an omni-channel customer care solution of Cisco (Cisco). The product mainly provides self-service Interactive Voice Response (IVR) and multi-channel automatic call distribution
| VAR-201810-0319 | CVE-2018-0444 | Cisco Packaged Contact Center Enterprise Vulnerable to cross-site scripting |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Packaged Contact Center Enterprise could allow an unauthenticated, remote attacker to conduct a stored XSS attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a customized link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. Cisco Packaged Contact Center Enterprise Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. The product mainly provides self-service Interactive Voice Response (IVR) and multi-channel automatic call distribution
| VAR-201809-0603 | CVE-2018-16546 | Amcrest_IPC-HX1X3X-LEXUS_Eng_N_AMCREST Cryptographic vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
Amcrest networked devices use the same hardcoded SSL private key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation, as demonstrated by Amcrest_IPC-HX1X3X-LEXUS_Eng_N_AMCREST_V2.420.AC01.3.R.20180206. Amcrest_IPC-HX1X3X-LEXUS_Eng_N_AMCREST Contains a cryptographic vulnerability.Information may be obtained. Amcrest is a network camera product from Amcrest Corporation of the United States. An attacker could exploit the vulnerability to bypass the encryption protection mechanism by learning about other installed keys
| VAR-201809-0006 | CVE-2015-9266 | plural Ubiquiti Product Path traversal vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
The web management interface of Ubiquiti airMAX, airFiber, airGateway and EdgeSwitch XP (formerly TOUGHSwitch) allows an unauthenticated attacker to upload and write arbitrary files using directory traversal techniques. An attacker can exploit this vulnerability to gain root privileges. This vulnerability is fixed in the following product versions (fixes released in July 2015, all prior versions are affected): airMAX AC 7.1.3; airMAX M (and airRouter) 5.6.2 XM/XW/TI, 5.5.11 XM/TI, and 5.5.10u2 XW; airGateway 1.1.5; airFiber AF24/AF24HD 2.2.1, AF5x 3.0.2.1, and AF5 2.2.1; airOS 4 XS2/XS5 4.0.4; and EdgeSwitch XP (formerly TOUGHSwitch) 1.3.2. plural Ubiquiti Product Contains a path traversal vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Ubiquiti airMAX AC, etc. are all products of Ubiquiti Networks in the United States. The Ubiquiti airMAX AC is a wireless access point device. airGateway is a gateway device
| VAR-201810-0307 | CVE-2018-0432 | Cisco SD-WAN Solution Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the error reporting feature of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the error reporting application configuration. An attacker could exploit this vulnerability by sending a crafted command to the error reporting feature. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device. Cisco SD-WAN Solution Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco vEdge 100 Series Routers and so on are products of Cisco. The Cisco vEdge 100 Series Routers is a 100 Series router product. vManageNetworkManagementSystem is a network management system. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN is prone to remote privilege-escalation vulnerability.
This issue is tracked by Cisco Bug ID CSCvi69801
| VAR-201810-0314 | CVE-2018-0439 | Cisco Meeting Server Vulnerable to cross-site request forgery |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the web-based management interface of Cisco Meeting Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a customized link. A successful exploit could allow the attacker to perform arbitrary actions on an affected device by using a web browser and with the privileges of the user. Cisco Meeting Server is prone to a cross-site request-forgery vulnerability. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCvi48644
| VAR-201810-0332 | CVE-2018-0458 | Cisco Prime Collaboration Assurance Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Prime Collaboration Assurance could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a customized link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. Cisco Prime Collaboration Assurance Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCvg15441. This solution supports simplified unified communication and video collaboration network management through a unified management console, and rapid deployment of communication sites
| VAR-201809-0169 | CVE-2018-14770 | VIVOTEK FD8177 Command injection vulnerabilities in devices |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
VIVOTEK FD8177 devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code (issue 1 of 2) via the ONVIF interface, (/onvif/device_service). VIVOTEK FD8177 The device contains a command injection vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. VIVOTEKFD8177 is a network camera product from Vivotek. There is a security vulnerability in VIVOTEK FD8177 prior to XXXXXX-VVTK-xx06a
| VAR-201809-0170 | CVE-2018-14771 | VIVOTEK FD8177 Command Injection Vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
VIVOTEK FD8177 devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code (issue 2 of 2) via eventscript.cgi. VIVOTEK FD8177 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. VIVOTEKFD8177 is a network camera product from Vivotek. A command injection vulnerability exists in versions prior to VIVOTEKFD8177XXXXXX-VVTK-xx06a
| VAR-201809-0168 | CVE-2018-14769 | VIVOTEK FD8177 Device cross-site request forgery vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
VIVOTEK FD8177 The device contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. VIVOTEK FD8177 is a network camera product of Vivotek. There is a cross-site request forgery vulnerability in VIVOTEK FD8177 devices prior to XXXXXX-VVTK-xx06a. A remote attacker can exploit this vulnerability to hijack cgi commands
| VAR-201810-0308 | CVE-2018-0433 | Cisco SD-WAN Solution Command Injection Vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in the command-line interface (CLI) in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI utility. The attacker must be authenticated to access the CLI utility. A successful exploit could allow the attacker to execute commands with root privileges. Cisco SD-WAN Solution Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Cisco vEdge 100 Series Routers is a 100 Series router product. vManageNetworkManagementSystem is a network management system. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN is prone to a local command-injection vulnerability.
This issue being tracked by Cisco Bug IDs CSCvi69802 and CSCvi69903
| VAR-201810-0309 | CVE-2018-0434 | Cisco SD-WAN Solution Vulnerabilities related to certificate validation |
CVSS V2: 5.8 CVSS V3: 7.4 Severity: HIGH |
A vulnerability in the Zero Touch Provisioning feature of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data by using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software. Cisco SD-WAN Solution Contains a certificate validation vulnerability.Information may be obtained and information may be altered. Cisco vEdge 100 Series Routers and so on are products of Cisco. The Cisco vEdge 100 Series Routers is a 100 Series router product. vManageNetworkManagementSystem is a network management system. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN is prone to a security-bypass vulnerability.
This issue is being tracked by Cisco Bug ID CSCvi69940
| VAR-201810-0295 | CVE-2018-0414 | Cisco Secure Access Control Server In XML External entity vulnerabilities |
CVSS V2: 3.5 CVSS V3: 5.7 Severity: MEDIUM |
A vulnerability in the web-based UI of Cisco Secure Access Control Server could allow an authenticated, remote attacker to gain read access to certain information in an affected system. The vulnerability is due to improper handling of XML External Entities (XXEs) when parsing an XML file. An attacker could exploit this vulnerability by convincing the administrator of an affected system to import a crafted XML file.
An attacker can exploit this issue to gain access to sensitive information that may lead to further attacks.
This issue is being tracked by Cisco bug ID CSCvi85318
| VAR-201810-0324 | CVE-2018-0450 | Cisco Data Center Network Manager Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Data Center Network Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the management interface on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a customized link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCvh70379. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions