VARIoT IoT vulnerabilities database
| VAR-201808-0928 | CVE-2018-3663 | Intel Saffron MemoryBase Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 2.7 CVSS V3: 5.7 Severity: MEDIUM |
Escalation of privilege in Intel Saffron MemoryBase before 11.4 allows an authenticated user access to privileged information. Intel Saffron MemoryBase is a memory base kit for Saffron developed by Intel Corporation. A security vulnerability exists in Intel Saffron MemoryBase prior to 11.4. An attacker could exploit this vulnerability to elevate privileges and gain access to sensitive information
| VAR-201808-0927 | CVE-2018-3662 | Intel Saffron MemoryBase Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
Escalation of privilege in Intel Saffron MemoryBase before version 11.4 potentially allows an authorized user of the Saffron application to execute arbitrary code as root. Intel Saffron MemoryBase Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Saffron MemoryBase is a memory base kit for Saffron developed by Intel Corporation. A security vulnerability exists in Intel Saffron MemoryBase prior to 11.4
| VAR-201808-0926 | CVE-2018-3650 | INTEL Distribution for Python Input validation vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Insufficient Input Validation in Bleach module in INTEL Distribution for Python versions prior to IDP 2018 Update 2 allows unprivileged user to bypass URI sanitization via local vector. INTEL Distribution for Python Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Distribution for Python is a Python-based integrated software package from Intel Corporation of the United States. It is mainly used to accelerate computing-intensive applications and optimize performance using Intel's native performance library. Bleach module is one of the text cleaning modules. The vulnerability stems from the program's insufficient implementation of input validation. Attackers can exploit this vulnerability to bypass URL filtering
| VAR-201808-0872 | CVE-2018-3672 | Intel Smart Sound Technology Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 7.2 CVSS V3: 8.8 Severity: HIGH |
Driver module in Intel Smart Sound Technology before version 9.21.00.3541 potentially allows a local attacker to execute arbitrary code as administrator via a system calls. Intel Smart Sound Technology Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Smart Sound Technology is an integrated audio DSP (digital signal processor) of Intel Corporation, which is mainly used to process audio and support voice interaction
| VAR-201808-0871 | CVE-2018-3671 | Intel Saffron admin Vulnerabilities related to authorization, authority, and access control in applications |
CVSS V2: 2.7 CVSS V3: 5.7 Severity: MEDIUM |
Escalation of privilege in Intel Saffron admin application before 11.4 allows an authenticated user to access unauthorized information. An attacker could exploit this vulnerability to elevate privileges and gain access to unauthorized information
| VAR-201808-0870 | CVE-2018-3670 | Intel Smart Sound Technology Buffer error vulnerability |
CVSS V2: 7.2 CVSS V3: 8.8 Severity: HIGH |
Driver module in Intel Smart Sound Technology before version 9.21.00.3541 potentially allows a local attacker to execute arbitrary code as administrator via a buffer overflow. Intel Smart Sound Technology is an integrated audio DSP (digital signal processor) of Intel Corporation, which is mainly used to process audio and support voice interaction
| VAR-201808-0297 | CVE-2018-0397 | Cisco AMP for Endpoints Mac Connector software Resource management vulnerability |
CVSS V2: 7.1 CVSS V3: 5.9 Severity: MEDIUM |
A vulnerability in Cisco AMP for Endpoints Mac Connector Software installed on Apple macOS 10.12 could allow an unauthenticated, remote attacker to cause a kernel panic on an affected system, resulting in a denial of service (DoS) condition. The vulnerability exists if the affected software is running in Block network conviction mode. Exploitation could occur if the system that is running the affected software starts a server process and an address in the IP blacklist cache of the affected software attempts to connect to the affected system. A successful exploit could allow the attacker to cause a kernel panic on the system that is running the affected software, resulting in a DoS condition. Cisco Bug IDs: CSCvk08192. Cisco AMP for Endpoints Mac Connector software Contains a resource management vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvk08192 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state.
Exploiting this issue allows remote attackers to trigger kernel panics, denying further service to legitimate users. The program analyzes malware behavior and intent, the impact of threats, defense methods, and more
| VAR-201808-0869 | CVE-2018-3666 | Intel Smart Sound Technology Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 7.2 CVSS V3: 8.8 Severity: HIGH |
Driver module in Intel Smart Sound Technology before version 9.21.00.3541 potentially allows a local attacker to execute arbitrary code as administrator via a non-paged pool overflow. Intel Smart Sound Technology Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Smart Sound Technology is an integrated audio DSP (digital signal processor) of Intel Corporation, which is mainly used to process audio and support voice interaction
| VAR-201807-1269 | CVE-2018-14533 | Inteno IOPSYS Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
read_tmp and write_tmp in Inteno IOPSYS allow attackers to gain privileges after writing to /tmp/etc/smb.conf because /var is a symlink to /tmp. Inteno IOPSYS Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Inteno IOPSYS is an open service delivery platform developed by Sweden's Inteno Broadband Technology Company. The platform consists of Gateway OS, Home Portal and various software development kits. A security vulnerability exists in the 'read_tmp' and 'write_tmp' functions in Inteno IOPSYS. An attacker could exploit this vulnerability to gain privileges
| VAR-201808-0905 | CVE-2018-3937 | Sony IPELA E Series Camera G5 In firmware OS Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
An exploitable command injection vulnerability exists in the measurementBitrateExec functionality of Sony IPELA E Series Network Camera G5 firmware 1.87.00. A specially crafted GET request can cause arbitrary commands to be executed. An attacker can send an HTTP request to trigger this vulnerability. The SonyIPELA camera is a web-facing camera for monitoring and monitoring
| VAR-201808-0906 | CVE-2018-3938 | Sony IPELA E Series Camera G5 Firmware buffer error vulnerability |
CVSS V2: 7.5 CVSS V3: 10.0 Severity: CRITICAL |
An exploitable stack-based buffer overflow vulnerability exists in the 802dot1xclientcert.cgi functionality of Sony IPELA E Series Camera G5 firmware 1.87.00. A specially crafted POST can cause a stack-based buffer overflow, resulting in remote code execution. An attacker can send a malicious POST request to trigger this vulnerability. The SonyIPELA camera is a web-facing camera for monitoring and monitoring
| VAR-201808-0170 | CVE-2018-10618 |
Davolink DVW-3200N Router Weak Password Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201807-0335 |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device. Davolink DVW-3200N Contains a cryptographic vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. The DVW3200 is a router product from Davolink. Davolink DVW-3200N is prone to an information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information that may aid in further attacks
| VAR-201807-0223 | CVE-2017-5693 | Intel Puma Vulnerabilities related to resource depletion in Japanese firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletion or timeout, which allows a network attacker to create a denial of service via crafted network traffic. Intel Puma Vulnerabilities exist in vulnerabilities related to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Intel Puma is prone to a denial-of-service vulnerability.
Attackers can exploit this issue to cause denial-of-service condition, denying service to legitimate users.
The following versions are affected:
Intel Puma 5 Chipset
Intel Puma 6 SoC
Intel Puma 7 SoC. Intel Puma 5, 6 and 7 Series are different series of modem chip products of Intel Corporation of the United States
| VAR-201808-0131 | CVE-2017-5692 | Intel Graphics Driver Vulnerable to out-of-bounds reading |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Out-of-bounds read condition in older versions of some Intel Graphics Driver for Windows code branches allows local users to perform a denial of service attack. Intel Graphics Driver Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Intel Graphics Driver is prone to a denial-of-service vulnerability.
Attackers can exploit this issue to cause denial-of-service condition, denying service to legitimate users. The following versions are affected: Intel Graphics Driver version 15.45 (SKL and KBL), version 15.40 (Windows 7, 8.1, 10), version 15.36 (HSW systems using Windows 7, 8.1)
| VAR-201807-2196 | CVE-2018-5544 | F5 BIG-IP APM Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
When the F5 BIG-IP APM 13.0.0-13.1.1 or 12.1.0-12.1.3 renders certain pages (pages with a logon agent or a confirm box), the BIG-IP APM may disclose configuration information such as partition and agent names via URI parameters. F5 BIG-IP APM Contains an information disclosure vulnerability.Information may be obtained. F5 BIG-IP APM is prone to an information-disclosure vulnerability.
Successfully exploiting this issue may allow attackers to obtain sensitive information. This may lead to other attacks. F5 BIG-IP Access Policy Manager (APM) is a set of access and security solutions from F5 Corporation of the United States. The solution provides unified access to business-critical applications and networks
| VAR-201807-2195 | CVE-2018-5543 | F5 BIG-IP Controller Vulnerabilities related to certificate and password management |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
The F5 BIG-IP Controller for Kubernetes 1.0.0-1.5.0 (k8s-bigip-crtl) passes BIG-IP username and password as command line parameters, which may lead to disclosure of the credentials used by the container. F5 BIG-IP Controller Contains a vulnerability related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5 Container Connector is prone to an information-disclosure vulnerability.
Successful exploits may allow an attacker to obtain sensitive information that may lead to further attacks. Failed exploit attempts will result in a denial of service condition. F5 BIG-IP Controller for Kubernetes is a management controller for dynamically creating, managing and destroying BIG-IP objects from F5 Corporation in the United States. An attacker could exploit the vulnerability to disclose the credentials used by the container
| VAR-201808-0596 | CVE-2018-11050 | Dell EMC NetWorker Vulnerabilities related to certificate and password management |
CVSS V2: 3.3 CVSS V3: 8.8 Severity: HIGH |
Dell EMC NetWorker versions between 9.0 and 9.1.1.8 through 9.2.1.3, and the version 18.1.0.1 contain a Clear-Text authentication over network vulnerability in the Rabbit MQ Advanced Message Queuing Protocol (AMQP) component. User credentials are sent unencrypted to the remote AMQP service. An unauthenticated attacker in the same network collision domain, could potentially sniff the password from the network and use it to access the component using the privileges of the compromised user. Dell EMC NetWorker Contains vulnerabilities related to certificate and password management and vulnerabilities related to cryptography.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Dell EMC NetWorker is prone to a security bypass vulnerability.
An attacker can exploit this issue to perform man-in-the-middle attacks and certain unauthorized actions, which will aid in further attacks.
The following product are affected:
Dell EMC NetWorker 9.0
Dell EMC NetWorker 9.1.1.8 and prior
Dell EMC NetWorker 9.2.1.3 and prior
Dell EMC NetWorker 18.1.0.1. The software provides backup and recovery, deduplication, backup reporting, and more.
Dell EMC recommends all customers upgrade at the earliest opportunity. Customers can download a fixed version directly at the links below.
Link to remedies:
For more information and access to the various releases, see https://support.emc.com/downloads/1095_NetWorker
Severity Rating
For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
Legal Information
Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of bus
iness profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.
Dell EMC Product Security Response Center
security_alert@emc.com
http://www.emc.com/products/security/product-security-response-center.htm
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEazKDH3UU9DEtTDc5dty75+wTzVkFAltYym8ACgkQdty75+wT
zVni7gf+OdRos9pBAxu6Q0HePcbikxSojfZ7lPV7C+v0tm57U6m8tezCMK/Vr2Tp
UjkwvAhCbuYPjauffqaKh2zZ1OgaibbMTp1y3cDtVbvO0rrM0dnKydnpOzTyAI4a
ooKA7OvFrw1qJpmv8zABzv4c9A2+YjBRRMlHX2OFTWei7ZR17Uux+LvBZOpj3/dF
cqSMj8LKxaZBQ/w7F3e8fDxMKazHf422N3Hc/P2mDe4d/GAPovs5yd8Urpl/UHno
V7QhwmRdaxmFf7T/GfFw58ZOEOI2B19K5PLFtLnrgBLAOc+SPvJELyAwJi4W4NFG
ihUimCnuTW6200OY6l+4/AsdJpfEEQ==
=P3D/
-----END PGP SIGNATURE-----
| VAR-201808-0903 | CVE-2018-3926 | Samsung SmartThings Hub STH-ETH-250 Firmware integer underflow vulnerability |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: MEDIUM |
An exploitable integer underflow vulnerability exists in the ZigBee firmware update routine of the hubCore binary of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The hubCore process incorrectly handles malformed files existing in its data directory, leading to an infinite loop, which eventually causes the process to crash. An attacker can send an HTTP request to trigger this vulnerability. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. Samsung SmartThings Hub is prone to a denial-of-service vulnerability. Due to the nature of this issue, arbitrary code execution may be possible but this has not been confirmed.
Samsung SmartThings Hub STH-ETH-250 0.20.17 is vulnerable; other versions may also be affected
| VAR-201809-1060 | CVE-2018-3873 | Samsung SmartThings Hub STH-ETH-250-Firmware Buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
An exploitable buffer overflow vulnerability exists in the credentials handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250-Firmware version 0.20.17. The strncpy overflows the destination buffer, which has a size of 128 bytes. An attacker can send an arbitrarily long "secretKey" value in order to exploit this vulnerability. Samsung SmartThings Hub STH-ETH-250-Firmware Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. This vulnerability stems from the fact that the video-core process failed to properly extract the fields in the JSON payload controlled by the user
| VAR-201808-0916 | CVE-2018-3893 | Samsung SmartThings Hub STH-ETH-250 Firmware buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An exploitable buffer overflow vulnerability exists in the /cameras/XXXX/clips handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability. Samsung SmartThings Hub STH-ETH-250 The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers. field