VARIoT IoT vulnerabilities database
| VAR-201808-0238 | CVE-2018-15904 | A10 ACOS Web Application Firewall In SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A10 ACOS Web Application Firewall (WAF) 2.7.1 and 2.7.2 before 2.7.2-P12, 4.1.0 before 4.1.0-P11, 4.1.1 before 4.1.1-P8, and 4.1.2 before 4.1.2-P4 mishandles the configured rules for blocking SQL injection attacks, aka A10-2017-0008. An attacker can exploit this vulnerability to execute arbitrary SQL commands by sending specially crafted SQL statements
| VAR-201809-0238 | CVE-2018-1353 | Fortinet FortiManager Vulnerable to information disclosure |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
An information disclosure vulnerability in Fortinet FortiManager 6.0.1 and below versions allows a standard user with adom assignment read the interface settings of vdoms unrelated to the assigned adom. Fortinet FortiManager Contains an information disclosure vulnerability.Information may be obtained. Fortinet FortiManager is prone to an information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information that may aid in further attacks.
Versions prior to FortiManager 6.0.1 are vulnerable. Fortinet FortiManager is a centralized network security management platform developed by Fortinet. The platform supports centralized management of any number of Fortinet devices, and can group devices into different management domains (ADOMs) to further simplify multi-device security deployment and management
| VAR-201808-0226 | CVE-2018-15602 | Zyxel VMG3312 B10B Device cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Zyxel VMG3312 B10B devices are affected by a persistent XSS vulnerability via the pages/connectionStatus/connectionStatus-hostEntry.cmd hostname parameter. Zyxel VMG3312 B10B The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. ZyxelVMG3312B10B is an Internet access gateway device from ZyXEL Technology. A cross-site scripting vulnerability exists in ZyxelVMG3312B10B. A remote attacker could exploit this vulnerability to inject arbitrary web scripts or HTML by sending a \342\200\230hostname\342\200\231 parameter to pages/connectionStatus/connectionStatus-hostEntry.cmdURL
| VAR-201808-0217 | CVE-2018-15852 | Technicolor TC7200.20 Vulnerabilities related to security functions in devices |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
Technicolor TC7200.20 devices allow remote attackers to cause a denial of service (networking outage) via a flood of random MAC addresses, as demonstrated by macof. NOTE: Technicolor denies that the described behavior is a vulnerability and states that Wi-Fi traffic is slowed or stopped only while the devices are exposed to a MAC flooding attack. This has been confirmed through testing against official up-to-date versions. ** Unsettled ** This case has not been confirmed as a vulnerability. Technicolor TC7200.20 The device contains vulnerabilities related to security functions. The vendor has disputed this vulnerability. For details, see NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2018-15852Service operation interruption (DoS) There is a possibility of being put into a state. TechnicolorTC7200.20 is a modem device from Technicolor, India. A buffer overflow vulnerability exists in TechnicolorTC7200.20
| VAR-201808-0266 | CVE-2018-15874 | D-Link DIR-615 Router cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability on D-Link DIR-615 routers 20.07 allows an attacker to inject JavaScript into the "Status -> Active Client Table" page via the hostname field in a DHCP request. D-Link DIR-615 The router contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-615 is a small wireless router product from D-Link. A cross-site scripting vulnerability exists in D-LinkDIR-61520.07
| VAR-201808-0267 | CVE-2018-15875 | D-Link DIR-615 Router cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability on D-Link DIR-615 routers 20.07 allows attackers to inject JavaScript into the router's admin UPnP page via the description field in an AddPortMapping UPnP SOAP request. D-Link DIR-615 The router contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-615 is a small wireless router product from D-Link. A cross-site scripting vulnerability exists in D-LinkDIR-61520.07
| VAR-201808-0573 | CVE-2018-11653 | Netwave IP camera Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
Information disclosure in Netwave IP camera at //etc/RT2870STA.dat (via HTTP on port 8000) allows an unauthenticated attacker to exfiltrate sensitive information about the network configuration like the network SSID and password. Netwave IP camera Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NetwaveIPcamera is a network camera produced by Netwave Systems B.V. of the Netherlands. An information disclosure vulnerability exists in the /etc/RT2870STA.dat file in the NetwaveIP camera
| VAR-201808-0574 | CVE-2018-11654 | Netwave IP camera Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Information disclosure in Netwave IP camera at get_status.cgi (via HTTP on port 8000) allows an unauthenticated attacker to exfiltrate sensitive information from the device. NetwaveIPcamera is a network camera produced by Netwave Systems B.V. of the Netherlands
| VAR-201808-1045 | No CVE | Taian Technology AP-PCLINK setup V1.5 has a memory corruption vulnerability |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
AP series is a new generation of programmable controller (PLC) newly developed by Taian Technology.
Taian Technology AP-PCLINK setup V1.5 has a memory corruption vulnerability. This vulnerability is due to the failure of AP-PCLINK to read the malformed project to verify the availability of the function pointer. An attacker could exploit the vulnerability to cause the null pointer memory to be read, causing memory corruption
| VAR-201808-1044 | No CVE | Tai'an Technology SG2 software has a memory read out-of-bounds vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Taian Technology (Wuxi) Co., Ltd. is a manufacturer, sales and R & D of a series of industrial control and low voltage electrical and power distribution products, namely electronics and component products.
There is a memory read out-of-bounds vulnerability in Taian SG2 software. This vulnerability is due to the failure of SG2 software to verify the availability of function pointers when reading malformed projects. An attacker could use the vulnerability to cause memory reads to cross boundaries and cause denial of service
| VAR-201808-1046 | No CVE | Taian Technology TP03-software V21 has a memory read out of bounds vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
TP03-software V21 is a programmable controller.
Taian Technology TP03-Software V21 has a memory read out-of-bounds vulnerability. The vulnerability is due to the failure of TP03-software to read the malformed project to verify that the function pointer is available. An attacker could use the vulnerability to cause the memory read to cross the boundary and cause a denial of service
| VAR-201808-0474 | CVE-2018-15529 | Mutiny Monitoring Appliance Command Injection Vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
A command injection vulnerability in maintenance.cgi in Mutiny "Monitoring Appliance" before 6.1.0-5263 allows authenticated users, with access to the admin interface, to inject arbitrary commands within the filename of a system upgrade upload. Mutiny Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MutinyMonitoringAppliance is a network monitoring device from Mutiny, UK. A command injection vulnerability exists in the maintenance.cgi file in versions prior to MutinyMonitoringAppliance6.1.0-5263. An attacker could use this vulnerability to inject arbitrary commands into a file name.
[Version Tested]
Version 6.1.0-5191 was tested and is vulnerable.
[Solution]
Upgrade to v6.1.0-5263.
[Reference]
https://www.mutiny.com/mutiny-support/previous-releases/ (Under the "Patches/Bugs" Fixed section)
[Timeline]
August 12, 2018 - A detailed report and exploit was sent to the vendor.
August 13, 2018 - The vendor released a patch (version 6.1.0-5263).
August 19, 2018 - Mitre assigned a CVE
| VAR-201808-0291 | CVE-2018-15748 | Dell 2335dn Vulnerabilities related to certificate and password management in multiple printer firmware |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
On Dell 2335dn printers with Printer Firmware Version 2.70.05.02, Engine Firmware Version 1.10.65, and Network Firmware Version V4.02.15(2335dn MFP) 11-22-2010, the admin interface allows an authenticated attacker to retrieve the configured SMTP or LDAP password by viewing the HTML source code of the Email Settings webpage. In some cases, authentication can be achieved with the blank default password for the admin account. NOTE: the vendor indicates that this is an "End Of Support Life" product. Dell 2335dn Printer Printer firmware, Engin firmware, Network The firmware contains a vulnerability related to certificate and password management. Dell 2335dn is a multifunctional laser printer product of Dell (Dell). An attacker could exploit this vulnerability to retrieve the configured SMTP or LDAP password and possibly authenticate with an empty default administrator account password
| VAR-201808-0375 | CVE-2018-14786 | plural BD Alaris Vulnerability related to lack of certification for critical functions in the product |
CVSS V2: 7.5 CVSS V3: 9.4 Severity: CRITICAL |
Becton, Dickinson and Company (BD) Alaris Plus medical syringe pumps (models Alaris GS, Alaris GH, Alaris CC, and Alaris TIVA) versions 2.3.6 and prior are affected by an improper authentication vulnerability where the software does not perform authentication for functionality that requires a provable user identity, where it may allow a remote attacker to gain unauthorized access to various Alaris Syringe pumps and impact the intended operation of the pump when it is connected to a terminal server via the serial port. plural BD Alaris The product is vulnerable to a lack of authentication for critical functions.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. BDAlarisGS and so on are different series of medical syringe pumps from BD. A mis-certification vulnerability exists in several BD products due to software failure to perform authentication on features that require authentication. The vulnerability could be exploited by a remote attacker to gain unauthorized access to the Alaris syringe pump, affecting the operation of the syringe pump. Multiple BD Products are prone to a security-bypass vulnerability.
Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. BD Alaris GS, etc. The following products and versions are affected: BD Alaris GS 2.3.6 and earlier; BD Alaris GH 2.3.6 and earlier; BD Alaris CC 2.3.6 and earlier; BD Alaris TIVA 2.3.6 and earlier
| VAR-201808-0568 | CVE-2018-1157 | Mikrotik RouterOS Vulnerable to resource exhaustion |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server and in some circumstances reboot the system via a crafted HTTP POST request. Mikrotik RouterOS Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. MikroTikRouterOS is a Linux-based routing operating system developed by MikroTik of Latvia. This system turns a PC into a professional router
| VAR-201808-0565 | CVE-2018-1156 | Mikrotik RouterOS Buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to stack buffer overflow through the license upgrade interface. This vulnerability could theoretically allow a remote authenticated attacker execute arbitrary code on the system. Mikrotik RouterOS Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MikroTikRouterOS is a Linux-based routing operating system developed by MikroTik of Latvia. This system turns a PC into a professional router
| VAR-201808-0569 | CVE-2018-1158 | Mikrotik RouterOS Vulnerable to resource exhaustion |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a stack exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server via recursive parsing of JSON. Mikrotik RouterOS Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. MikroTikRouterOS is a Linux-based routing operating system developed by MikroTik of Latvia. This system turns a PC into a professional router. Security vulnerabilities existed in versions prior to MikrotikRouterOS 6.42.7 and versions prior to 6.40.9
| VAR-201808-0570 | CVE-2018-1159 | Mikrotik RouterOS Buffer error vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory corruption vulnerability. An authenticated remote attacker can crash the HTTP server by rapidly authenticating and disconnecting. Mikrotik RouterOS Contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. MikroTikRouterOS is a Linux-based routing operating system developed by MikroTik of Latvia. This system turns a PC into a professional router
| VAR-201808-0889 | CVE-2018-3833 | Insteon Hub Firmware access control vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An exploitable firmware downgrade vulnerability exists in Insteon Hub running firmware version 1013. The firmware upgrade functionality, triggered via PubNub, retrieves signed firmware binaries using plain HTTP requests. The device doesn't check the firmware version that is going to be installed and thus allows for flashing older firmware images. To trigger this vulnerability, an attacker needs to impersonate the remote server 'cache.insteon.com' and serve any signed firmware image. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
| VAR-201808-0157 | CVE-2017-16348 | Insteon Hub Firmware authentication vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An exploitable denial of service vulnerability exists in Insteon Hub running firmware version 1012. Leftover demo functionality allows for arbitrarily rebooting the device without authentication. An attacker can send a UDP packet to trigger this vulnerability. Insteon Hub There are authentication vulnerabilities in the firmware.Service operation interruption (DoS) There is a possibility of being put into a state. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. Insteon Hub is an Insteon central controller product of Insteon Company in the United States