VARIoT IoT vulnerabilities database
| VAR-201808-0920 | CVE-2018-3904 | Samsung SmartThings Hub STH-ETH-250 Firmware buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
An exploitable buffer overflow vulnerability exists in the camera 'update' feature of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability. Samsung SmartThings Hub STH-ETH-250 The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. video-coreHTTPserver is one of the HTTP servers
| VAR-201808-0896 | CVE-2018-3918 | Samsung SmartThings Hub STH-ETH-250 - Firmware Vulnerable to improper enforcement of messages or data structures |
CVSS V2: 6.4 CVSS V3: 7.5 Severity: HIGH |
An exploitable vulnerability exists in the remote servers of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The hubCore process listens on port 39500 and relays any unauthenticated messages to SmartThings' remote servers, which incorrectly handle camera IDs for the 'sync' operation, leading to arbitrary deletion of cameras. An attacker can send an HTTP request to trigger this vulnerability. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung. The camera ID of the 'sync' operation
| VAR-201808-0904 | CVE-2018-3927 | Samsung SmartThings Hub STH-ETH-250 Certificate validation vulnerability in firmware |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
An exploitable information disclosure vulnerability exists in the crash handler of the hubCore binary of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. When hubCore crashes, Google Breakpad is used to record minidumps, which are sent over an insecure HTTPS connection to the backtrace.io service, leading to the exposure of sensitive data. An attacker can impersonate the remote backtrace.io server in order to trigger this vulnerability. Samsung SmartThings Hub STH-ETH-250 The firmware contains a certificate validation vulnerability.Information may be obtained. SamsungSmartThingsHub is a smart home management device from South Korea's Samsung
| VAR-201807-1681 | CVE-2018-9066 | Lenovo xClarity Administrator Access control vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
In Lenovo xClarity Administrator versions earlier than 2.1.0, an authenticated LXCA user can, under specific circumstances, inject additional parameters into a specific web API call which can result in privileged command execution within LXCA's underlying operating system. Lenovo xClarity Administrator Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Lenovo XClarity Administrator (LXCA) is a set of centralized resource management solutions of China Lenovo (Lenovo). The solution supports simplified infrastructure management, faster server response, and improved Lenovo server system performance. There are security vulnerabilities in the Web API in versions earlier than Lenovo LXCA 2.1.0
| VAR-201807-1680 | CVE-2018-9065 | Lenovo xClarity Administrator Access control vulnerability |
CVSS V2: 3.5 CVSS V3: 7.5 Severity: HIGH |
In Lenovo xClarity Administrator versions earlier than 2.1.0, an attacker that gains access to the underlying LXCA file system user may be able to retrieve a credential store containing the service processor user names and passwords for servers previously managed by that LXCA instance, and potentially decrypt those credentials more easily than intended. Lenovo xClarity Administrator Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Lenovo XClarity Administrator (LXCA) is a set of centralized resource management solutions of China Lenovo (Lenovo). The solution supports simplified infrastructure management, faster server response, and improved Lenovo server system performance. There are security vulnerabilities in the Web API in versions earlier than Lenovo LXCA 2.1.0
| VAR-201807-1679 | CVE-2018-9064 | Lenovo xClarity Administrator Access control vulnerability |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
In Lenovo xClarity Administrator versions earlier than 2.1.0, an authenticated LXCA user may abuse a web API debug call to retrieve the credentials for the System Manager user. Lenovo xClarity Administrator Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Lenovo XClarity Administrator (LXCA) is a set of centralized resource management solutions of China Lenovo (Lenovo). The solution supports simplified infrastructure management, faster server response, and improved Lenovo server system performance. There are security vulnerabilities in the Web API in versions earlier than Lenovo LXCA 2.1.0
| VAR-201807-0541 | CVE-2018-13280 | Synology DiskStation Manager Vulnerable to use of insufficient random values |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
Use of insufficiently random values vulnerability in SYNO.Encryption.GenRandomKey in Synology DiskStation Manager (DSM) before 6.2-23739 allows man-in-the-middle attackers to compromise non-HTTPS sessions via unspecified vectors. Synology DiskStation Manager (DSM) is an operating system developed by Synology for network storage servers (NAS). The operating system can manage data, documents, photos, music and other information. Attackers can exploit this vulnerability to implement man-in-the-middle attacks and control non-HTTPS sessions
| VAR-201807-1683 | CVE-2018-9068 | IMM2 Vulnerabilities related to the use of hard-coded credentials |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The IMM2 First Failure Data Capture function collects management module logs and diagnostic information when a hardware error is detected. This information is made available for download through an SFTP server hosted on the IMM2 management network interface. In versions earlier than 4.90 for Lenovo System x and earlier than 6.80 for IBM System x, the credentials to access the SFTP server are hard-coded and described in the IMM2 documentation, allowing an attacker with management network access to obtain the collected FFDC data. After applying the update, the IMM2 will create random SFTP credentials for use with OneCLI. IMM2 Contains a vulnerability in the use of hard-coded credentials.Information may be obtained
| VAR-201809-0087 | CVE-2018-10602 | (0Day) Wecon LeviStudioU aetlog TrendSet WordAddr2 Stack-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Wecon LeviStudioU. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of UMP files. When parsing the TrendSet WordAddr4 element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of Administrator. WECON LeviStudio is a set of human interface programming software from WECON, China
| VAR-201807-2075 | CVE-2018-7992 | plural HUAWEI Product buffer error vulnerability |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
Mdapt Driver of Huawei MediaPad M3 BTV-W09C128B353CUSTC128D001; Mate 9 Pro versions earlier than 8.0.0.356(C00); P10 Plus versions earlier than 8.0.0.357(C00) has a buffer overflow vulnerability. The driver does not sufficiently validate the input, an attacker could trick the user to install a malicious application which would send crafted parameters to the driver. Successful exploit could cause a denial of service condition. HuaweiMate9Pro and P10Plus are both Huawei's smartphone products. The MediaPadM3 is a tablet. There are buffer overflow vulnerabilities in Huawei's various products, and the driver failed to fully verify the program's input. Mdapt Driver is one of the dithering effect drivers
| VAR-201807-2271 | No CVE | D-Link DAP-1360 File Path Traversal and Cross-Site Scripting Vulnerability |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The D-Link DAP-1360 is a wireless router. D-LinkDAP-1360 has file path traversal and cross-site scripting vulnerabilities that allow remote attackers to read passwords with incorrect parameters, resulting in absolute path traversal attacks.
| VAR-201807-0100 | CVE-2017-10937 | ZTE ZXIPTV-UCM SQL Injection Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
SQL injection vulnerability in all versions prior to V2.01.05.09 of the ZTE ZXIPTV-UCM product allows remote attackers to execute arbitrary SQL commands via the opertype parameter, resulting in the disclosure of database information. ZTE ZXIPTV-UCM The product includes SQL An injection vulnerability exists.Information may be obtained. ZTEZXIPTV-UCM is a set-top box device from China ZTE Corporation (ZTE)
| VAR-201807-0099 | CVE-2017-10936 | ZTE ZXCDN-SNS SQL Injection Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
SQL injection vulnerability in all versions prior to V4.01.01 of the ZTE ZXCDN-SNS product allows remote attackers to execute arbitrary SQL commands via the aoData parameter, resulting in the disclosure of database information. ZTE ZXCDN-SNS Products include SQL An injection vulnerability exists.Information may be obtained. ZTEZXCDN-SNS is a hardware device of China ZTE Corporation (ZTE)
| VAR-201807-0098 | CVE-2017-10935 | ZTE ZXR10 1800-2S Vulnerabilities related to certificate and password management in products |
CVSS V2: 4.0 CVSS V3: 7.2 Severity: HIGH |
All versions prior to ZSRV2 V3.00.40 of the ZTE ZXR10 1800-2S products allow remote authenticated users to bypass the original password authentication protection to change other user's password. ZTE ZXR10 1800-2S There are vulnerabilities related to certificate / password management and authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZTEZXR101800-2SZSRV2 is a router product of China ZTE Corporation (ZTE)
| VAR-201807-0097 | CVE-2017-10934 | ZTE ZXIPTV-EPG Vulnerable to unreliable data deserialization |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
All versions prior to V5.09.02.02T4 of the ZTE ZXIPTV-EPG product use the Java RMI service in which the servers use the Apache Commons Collections (ACC) library that may result in Java deserialization vulnerabilities. An unauthenticated remote attacker can exploit the vulnerabilities by sending a crafted RMI request to execute arbitrary code on the target host. ZTE ZXIPTV-EPG Contains a vulnerability in the deserialization of unreliable data.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZTEZXIPTV-EPG A set-top box device from China ZTE Corporation (ZTE). A Java deserialization vulnerability exists in previous versions of ZTEZXIPTV-EPG5.09.02.02T4. The vulnerability stems from the use of the JavaRMI service. Execute arbitrary code
| VAR-201807-2203 | CVE-2018-5538 | plural F5 BIG-IP Vulnerabilities related to security functions in products |
CVSS V2: 4.3 CVSS V3: 3.7 Severity: LOW |
On F5 BIG-IP DNS 13.1.0-13.1.0.7, 12.1.3-12.1.3.5, DNS Express / DNS Zones accept NOTIFY messages on the management interface from source IP addresses not listed in the 'Allow NOTIFY From' configuration parameter when the db variable "dnsexpress.notifyport" is set to any value other than the default of "0". plural F5 BIG-IP The product contains vulnerabilities related to security functions.Information may be tampered with. F5BIG-IP is an all-in-one network device that integrates network traffic management, application security management, load balancing and other functions. BIG-IPDNS is one of the traffic managers. A security vulnerability exists in F5BIG-IPDNS version 13.1.0 to 13.1.0.7 and 12.1.3 to 12.1.3.5. The vulnerability stems from setting the database variable 'dnsexpress.notifyport' to something other than the default '0' value. The source IP address of the NOTIF message received by DNSExpress/DNSZones on the management interface is not in the configuration parameter 'AllowNOTIFYFrom'. This vulnerability could be exploited by an attacker to cause DNS Express to continuously detect updates. Multiple F5 BIG-IP Products are prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks
| VAR-201807-2207 | CVE-2018-5531 | plural F5 BIG-IP Vulnerability related to input validation in products |
CVSS V2: 6.1 CVSS V3: 7.4 Severity: HIGH |
Through undisclosed methods, on F5 BIG-IP 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.0-11.6.3.1, or 11.2.1-11.5.6, adjacent network attackers can cause a denial of service for VCMP guest and host systems. Attack must be sourced from adjacent network (layer 2). plural F5 BIG-IP The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP is an all-in-one network device from F5 in the United States that integrates network traffic management, application security management, load balancing and other functions.
There are security vulnerabilities in F5 BIG-IP. Multiple F5 BIG-IP products are prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause a a denial-of-service condition. The following versions are affected: F5 BIG-IP version 13.0.0 to 13.1.0.7, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1, 11.2.1 to 11.5.6
| VAR-201807-2199 | CVE-2018-5530 | plural F5 BIG-IP Product depletion vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, or 11.6.0-11.6.3.1 virtual servers with HTTP/2 profiles enabled are vulnerable to "HPACK Bomb". plural F5 BIG-IP The product is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP Products are prone to a denial-of-service vulnerability.
Exploiting this issue allows remote attackers to cause a denial-of-service condition due to excessive memory consumption. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager. When the HTTP/2 configuration file is enabled, an attacker can exploit this vulnerability to cause denial of service (abnormal value of consumed memory resources). The following versions are affected: F5 BIG-IP LTM version 13.0.0 to 13.1.0.5, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1; BIG-IP AAM 13.0.0 to 13.1 .0.5, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1; BIG-IP AFM 13.0.0 to 13.1.0.5, 12.1.0 to 12.1.3.5, 11.6. 0 to 11.6.3.1; BIG-IP Analytics 13.0.0 to 13.1.0.5, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1; BIG-IP APM 13.0.0 to version 13.1.0.5, version 12.1.0 to version 12.1.3.5, version 11.6.0 to version 11.6.3.1; BIG-IP ASM version 13.0.0 to version 13.1.0.5, version 12.1.0 to version 12.1.3.5, 11.6.0 to 11.6.3.1; BIG-IP Edge Gateway 13.0.0 to 13.1.0.5, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1; BIG-IP PEM; BIG-IP WebSafe version 13.0.0 to version 13.1.0.5, version 12.1.0 to version 12.1.3.5, version 11.6.0 to version 11.6.3.1
| VAR-201807-2202 | CVE-2018-5537 | plural F5 Vulnerability related to input validation in products |
CVSS V2: 2.6 CVSS V3: 5.3 Severity: MEDIUM |
A remote attacker may be able to disrupt services on F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.1, or 11.2.1-11.5.6 if the TMM virtual server is configured with a HTML or a Rewrite profile. TMM may restart while processing some specially prepared HTML content from the back end. plural F5 The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5BIG-IP is an all-in-one network device that integrates network traffic management, application security management, load balancing and other functions. There is a security hole in F5BIG-IP. A security vulnerability exists in the F5 BIG-IP. The following versions are affected: F5 BIG-IP version 13.0.0 to 13.1.0.5, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1, 11.2.1 to 11.5.6
| VAR-201807-2194 | CVE-2018-5542 | plural F5 BIG-IP Vulnerability related to input validation in products |
CVSS V2: 6.8 CVSS V3: 8.1 Severity: HIGH |
F5 BIG-IP 13.0.0-13.0.1, 12.1.0-12.1.3.6, or 11.2.1-11.6.3.2 HTTPS health monitors do not validate the identity of the monitored server. plural F5 BIG-IP The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager. An attacker could exploit this vulnerability to disclose and modify the monitor's traffic. The following versions are affected: F5 BIG-IP LTM version 13.0.0 to 13.0.1, 12.1.0 to 12.1.3.6, 11.2.1 to 11.6.3.2; BIG-IP AAM 13.0.0 to 13.0 .1 version, 12.1.0 to 12.1.3.6, 11.2.1 to 11.6.3.2; BIG-IP AFM 13.0.0 to 13.0.1, 12.1.0 to 12.1.3.6, 11.2. 1 to 11.6.3.2; BIG-IP Analytics 13.0.0 to 13.0.1, 12.1.0 to 12.1.3.6, 11.2.1 to 11.6.3.2; BIG-IP APM 13.0.0 to version 13.0.1, version 12.1.0 to version 12.1.3.6, version 11.2.1 to version 11.6.3.2; BIG-IP ASM version 13.0.0 to version 13.0.1, version 12.1.0 to version 12.1.3.6, 11.2.1 to 11.6.3.2; BIG-IP DNS 13.0.0 to 13.0.1, 12.1.0 to 12.1.3.6, 11.2.1 to 11.6.3.2; BIG-IP Edge Gateway 13.0 .0 to 13.0.1, 12.1.0 to 12.1.3.6, 11.2.1 to 11.6.3.2; BIG-IP FPS 13.0.0 to 13.0.1, 12.1.0 to 12.1. Version 3.6, version 11.2.1 to 11.6.3