VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201808-0951 CVE-2018-7070 HPE CentralView Fraud Risk Management Vulnerable to information disclosure CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
HPE has identified a remote disclosure of information vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This issue is resolved in HF16 for HPE CV 6.1 or subsequent version
VAR-201808-0950 CVE-2018-7069 HPE CentralView Fraud Risk Management Vulnerabilities in authentication CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
HPE has identified a remote unauthenticated access to files vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This issue is resolved in HF16 for HPE CV 6.1 or subsequent version
VAR-201808-0949 CVE-2018-7068 HPE CentralView Fraud Risk Management In HTTP Request smuggling vulnerability CVSS V2: 5.8
CVSS V3: 6.1
Severity: MEDIUM
HPE has identified a remote HOST header attack vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This issue is resolved in HF16 for HPE CV 6.1 or subsequent version
VAR-201808-0934 CVE-2018-7078 HPE Integrated Lights-Out 4 and HPE Integrated Lights-Out 5 Vulnerability in CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
A remote code execution was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than version v2.60 and HPE Integrated Lights-Out 5 (iLO 5) earlier than version v1.30. Through an integrated remote management port, Monitor and maintain the running status of the server, remotely manage and control the server, etc. An attacker could exploit this vulnerability to execute code
VAR-201808-1002 CVE-2018-5390 TCP implementations vulnerable to Denial of Service CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service. Linux Kernel is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. Linux kernel 4.9 and later are vulnerable. 7) - aarch64, noarch, ppc64le 3. Security Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-5391) Space precludes documenting all of the security fixes in this advisory. 1623067 - CVE-2018-9363 kernel: Buffer overflow in hidp_process_report 1629636 - CVE-2018-14641 kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment() 6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2776-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2776 Issue date: 2018-09-25 CVE Names: CVE-2018-5390 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.4) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.4) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.4) - ppc64, ppc64le, x86_64 3. Security Fix(es): * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue. Bug Fix(es): * Previously, making the total buffer size bigger than the memory size for early allocation through the trace_buf_size boot option, made the system become unresponsive at the boot stage. This update introduces a change in the early memory allocation. As a result, the system no longer hangs in the above described scenario. (BZ#1588365) * When inserting objects with the same keys, made the rhlist implementation corrupt the chain pointers. As a consequence, elements were missing on removal and traversal. This patch updates the chain pointers correctly. As a result, there are no missing elements on removal and traversal in the above-described scenario. (BZ#1601008) * Previously, the kernel source code was missing support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems and the little-endian variants of IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported "Not affected" on both CPU architectures. This fix updates the kernel source code to properly report the SSBD status either as "Vulnerable" or "Mitigation: Kernel entry/exit barrier (TYPE)" where TYPE is one of "eieio", "hwsync", "fallback", or "unknown". (BZ#1612352) * Previously, the early microcode updater in the kernel was trying to perform a microcode update on virtualized guests. As a consequence, the virtualized guests sometimes mishandled the request to perform the microcode update and became unresponsive in the early boot stage. This update applies an upstream patch to avoid the early microcode update when running under a hypervisor. As a result, no kernel freezes appear in the described scenario. (BZ#1618389) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.4): Source: kernel-3.10.0-693.39.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.39.1.el7.noarch.rpm kernel-doc-3.10.0-693.39.1.el7.noarch.rpm x86_64: kernel-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.39.1.el7.x86_64.rpm kernel-devel-3.10.0-693.39.1.el7.x86_64.rpm kernel-headers-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.39.1.el7.x86_64.rpm perf-3.10.0-693.39.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm python-perf-3.10.0-693.39.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4): x86_64: kernel-debug-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.39.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.4): Source: kernel-3.10.0-693.39.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.39.1.el7.noarch.rpm kernel-doc-3.10.0-693.39.1.el7.noarch.rpm ppc64: kernel-3.10.0-693.39.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-693.39.1.el7.ppc64.rpm kernel-debug-3.10.0-693.39.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-693.39.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-693.39.1.el7.ppc64.rpm kernel-devel-3.10.0-693.39.1.el7.ppc64.rpm kernel-headers-3.10.0-693.39.1.el7.ppc64.rpm kernel-tools-3.10.0-693.39.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-693.39.1.el7.ppc64.rpm perf-3.10.0-693.39.1.el7.ppc64.rpm perf-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm python-perf-3.10.0-693.39.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm ppc64le: kernel-3.10.0-693.39.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debug-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.39.1.el7.ppc64le.rpm kernel-devel-3.10.0-693.39.1.el7.ppc64le.rpm kernel-headers-3.10.0-693.39.1.el7.ppc64le.rpm kernel-tools-3.10.0-693.39.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-693.39.1.el7.ppc64le.rpm perf-3.10.0-693.39.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm python-perf-3.10.0-693.39.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm s390x: kernel-3.10.0-693.39.1.el7.s390x.rpm kernel-debug-3.10.0-693.39.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-693.39.1.el7.s390x.rpm kernel-debug-devel-3.10.0-693.39.1.el7.s390x.rpm kernel-debuginfo-3.10.0-693.39.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-693.39.1.el7.s390x.rpm kernel-devel-3.10.0-693.39.1.el7.s390x.rpm kernel-headers-3.10.0-693.39.1.el7.s390x.rpm kernel-kdump-3.10.0-693.39.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-693.39.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-693.39.1.el7.s390x.rpm perf-3.10.0-693.39.1.el7.s390x.rpm perf-debuginfo-3.10.0-693.39.1.el7.s390x.rpm python-perf-3.10.0-693.39.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.s390x.rpm x86_64: kernel-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.39.1.el7.x86_64.rpm kernel-devel-3.10.0-693.39.1.el7.x86_64.rpm kernel-headers-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.39.1.el7.x86_64.rpm perf-3.10.0-693.39.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm python-perf-3.10.0-693.39.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.4): ppc64: kernel-debug-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-693.39.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-693.39.1.el7.ppc64.rpm perf-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.39.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-693.39.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.39.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-5390 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW6qe0NzjgjWX9erEAQifnQ//Yjt7BtzIu5kCLW7RctFFx62Ny8fJUuZ0 sLah6bMbzFmLPMvHLyrOY7W532MtFMuObhzumKzSlprP0eGYNmlz9XAxTrYD63bQ RRBHqyT0cjFYxRrtJx4S7oriE3x2jRmrcRFlmlN8Bl18XO+fieihrOH547AmXlrl eb/n0g//94pEfXiIbh9UWOqCw5jWTpk0R46Tl/i+ky4SrysGDDd1SzWP8+hnE+ps BSDZD6ubYM2T7qunnYZ0Ci7LbfMxFNtLedZvG9dO8Ywlqfif5RNNFXfXp7WvYRzb RBzcrSX+FdtY/XCn7ov3WkH32kadtx2Q7vvrA/eLdwYt+6BaGKMmU7yc+zOIsZpA 2uJUO7AYm3p9J4SW4hpxmuw3er4g+bSHGuXg8Nz6kWVyWrMzILAXQYDUDwI66rTy EZXbRaOJCFY3+vYSHKAcZRHnroSOsIq/EotegjqFN4fcSVMSNNlOeoRop7pr3kQq eWlpbaDcWiE7CA5camN4aO0doj25vIdIyT4E8B+QBP7AC5FcF94CpQkyb2htut5o 0usFXhzZSze2MxeECwIf74/1QrF+kcgcLbwBJw/k0COoJ0qLTnEOsAjMJNNR4+0N JrZ2SQAwYs/QbIGVJTGvyfVhNYnnr+EW5/nrBiZU6DokA3q6rEI/Tg4Q8OIx0wwX j4HjKybGYpU:wj -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 6.5) - x86_64 3. Bug Fix(es): * Previously, invalid headers in the sk_buff struct led to an indefinite loop in the tcp_collapse() function. (BZ#1619630) * After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the "__max_smt_threads()" function has been fixed. (BZ#1625333) * Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. (BZ#1629632) 4. ========================================================================= Ubuntu Security Notice USN-3741-2 August 14, 2018 linux-lts-xenial, linux-aws vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS Summary: Several security issues were fixed in the Linux kernel. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS). (CVE-2018-3646) It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker could use this to expose sensitive information (memory from the kernel or other processes). (CVE-2018-5391) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: linux-image-4.4.0-1027-aws 4.4.0-1027.30 linux-image-4.4.0-133-generic 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-generic-lpae 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-lowlatency 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-powerpc-e500mc 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-powerpc-smp 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-powerpc64-emb 4.4.0-133.159~14.04.1 linux-image-4.4.0-133-powerpc64-smp 4.4.0-133.159~14.04.1 linux-image-aws 4.4.0.1027.27 linux-image-generic-lpae-lts-xenial 4.4.0.133.113 linux-image-generic-lts-xenial 4.4.0.133.113 linux-image-lowlatency-lts-xenial 4.4.0.133.113 linux-image-powerpc-e500mc-lts-xenial 4.4.0.133.113 linux-image-powerpc-smp-lts-xenial 4.4.0.133.113 linux-image-powerpc64-emb-lts-xenial 4.4.0.133.113 linux-image-powerpc64-smp-lts-xenial 4.4.0.133.113 Please note that the recommended mitigation for CVE-2018-3646 involves updating processor microcode in addition to updating the kernel; however, the kernel includes a fallback for processors that have not received microcode updates. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. (CVE-2018-5391) * kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Consequently, the node was not available. This update fixes an irq latency source in memory compaction. As a consequence, the VMs sometimes became unresponsive when booting. (BZ#1618388) 4
VAR-201808-0326 CVE-2018-14941 Harmonic NSG 9000 Information disclosure vulnerability in devices CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Harmonic NSG 9000 devices allow remote authenticated users to read the webapp.py source code via a direct request for the /webapp.py URI. Harmonic NSG 9000 The device contains an information disclosure vulnerability.Information may be obtained
VAR-201808-0327 CVE-2018-14942 Harmonic NSG 9000 Path traversal vulnerability CVSS V2: 4.0
CVSS V3: 8.8
Severity: HIGH
Harmonic NSG 9000 devices allow remote authenticated users to conduct directory traversal attacks, as demonstrated by "POST /PY/EMULATION_GET_FILE" or "POST /PY/EMULATION_EXPORT" with FileName=../../../passwd in the POST data. Harmonic NSG 9000 Contains a path traversal vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Harmonic NSG 9000 is a general-purpose edge QAM modulator device produced by Harmonic Corporation of the United States. A security vulnerability exists in the Harmonic NSG 9000. A remote attacker could exploit this vulnerability to perform directory traversal attacks
VAR-201808-0328 CVE-2018-14943 Harmonic NSG 9000 Vulnerabilities related to the use of hard-coded credentials on devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Harmonic NSG 9000 devices have a default password of nsgadmin for the admin account, a default password of nsgguest for the guest account, and a default password of nsgconfig for the config account. Harmonic NSG 9000 The device contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The NSG ™ 9000-6G high-density universal edgeQAM system is a highly integrated digital video solution for multiplexing on-demand video content over IP networks. NSG 9000-6G has a weak password vulnerability. An attacker can use this vulnerability to log in to a website and obtain sensitive information on the website. Harmonic NSG 9000 is a general-purpose edge QAM modulator device produced by Harmonic Corporation of the United States. An attacker could exploit this vulnerability to gain access to the device
VAR-201808-0722 CVE-2018-14497 Tenda D152 ADSL Router cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Tenda D152 ADSL routers allow XSS via a crafted SSID. Tenda D152 ADSL The router contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. There is a security hole in Tenda D152 ADSL. Remote attackers can use the specially crafted SSID to exploit this vulnerability to inject arbitrary Web scripts or HTML
VAR-201808-1085 No CVE Command execution vulnerability in OOK-AP121, a panel wireless router of Wenzhou Dongkun Technology Co., Ltd. CVSS V2: 5.9
CVSS V3: -
Severity: MEDIUM
Wenzhou Dongkun Technology Co., Ltd. is a high-tech enterprise integrating design, research and development, production, Internet of Things, and wireless communication products and technologies for home LANs. R & D. Wenzhou Dongkun Technology Co., Ltd. panel wireless router OOK-AP121 has an unauthorized access vulnerability. An attacker can use the vulnerability to execute arbitrary commands with root privileges.
VAR-201808-0424 CVE-2018-14933 NUUO NVRmini Command injection vulnerability

Related entries in the VARIoT exploits database: VAR-E-201812-0167, VAR-E-201812-0168
CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
upgrade_handle.php on NUUO NVRmini devices allows Remote Command Execution via shell metacharacters in the uploaddir parameter for a writeuploaddir command. NUUO NVRmini Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NUUO NVRmini Products are prone to an remote command-injection vulnerability. An attacker may exploit this issue to inject and execute arbitrary commands within the context of the affected application; this may aid in further attacks. NUUO NVRmini is a video storage management device produced by American NUUO company. There is a security vulnerability in the upgrade_handle.php file in NUUO NVRmini
VAR-201808-0411 CVE-2018-14907 3CX Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
The Web server in 3CX version 15.5.8801.3 is vulnerable to Information Leakage, because of improper error handling in Stack traces, as demonstrated by discovering a full pathname. 3CX is an IP phone device from 3CX Corporation of the United States. The vulnerability stems from a program that failed to handle errors correctly in stack trace. An attacker could exploit the vulnerability to reveal information about the server
VAR-201808-0409 CVE-2018-14905 3CX Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
The Web server in 3CX version 15.5.8801.3 is vulnerable to Reflected XSS on the api/CallLog TimeZoneName parameter. 3CX Web server Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. 3CX is an IP phone device from 3CX Corporation of the United States. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML
VAR-201808-0410 CVE-2018-14906 3CX Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
The Web server in 3CX version 15.5.8801.3 is vulnerable to Reflected XSS on all stack traces' propertyPath parameters. 3CX Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. 3CX is an IP phone device from 3CX Corporation of the United States. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML
VAR-201808-0967 CVE-2018-9866 SonicWall Global Management System Input validation vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in lack of validation of user-supplied parameters pass to XML-RPC calls on SonicWall Global Management System (GMS) virtual appliance's, allow remote user to execute arbitrary code. This vulnerability affected GMS version 8.1 and earlier. SonicWall Global Management System (GMS) Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SonicWall Global Management System (GMS) is a global management system. The system enables rapid deployment and centralized management of Dell SonicWALL firewall, anti-spam, backup and recovery, and secure remote access solutions. A security vulnerability exists in SonicWall GMS due to the program's failure to validate user-submitted parameters for XML-RPC calls. A remote attacker could exploit this vulnerability to execute arbitrary code
VAR-201808-0595 CVE-2018-11048 Dell EMC Data Protection Advisor and EMC Integrated Data Protection Appliance In XML External entity vulnerabilities CVSS V2: 5.5
CVSS V3: 8.1
Severity: HIGH
Dell EMC Data Protection Advisor, versions 6.2, 6,3, 6.4, 6.5 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 contain a XML External Entity (XXE) Injection vulnerability in the REST API. An authenticated remote malicious user could potentially exploit this vulnerability to read certain system files in the server or cause denial of service by supplying specially crafted Document Type Definitions (DTDs) in an XML request. Attackers can exploit this issue to gain access to sensitive information or cause denial-of-service condition. IDPA is a disk-based backup and recovery solution. Link to remedies: Registered Dell EMC Online Support customers can download the required patch from support.emc.com at https://support.emc.com/downloads/829_Data-Protection-Advisor Severity Rating For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. Legal Information Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC distributes Dell EMC Security Advisories, in order to bring to the attention of users of the affected Dell EMC products, important security information. Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of bus iness profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. Dell EMC Product Security Response Center security_alert@emc.com http://www.emc.com/products/security/product-security-response-center.htm -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEazKDH3UU9DEtTDc5dty75+wTzVkFAltkbtEACgkQdty75+wT zVlSnQf/fxxkDXpPGn1XdyIT6siN8ZPj1HGcZv0FqyUw4wMuXBXs4OdnohlZiSmV Q0j4QWsIWaxYWvHMQJzqq7YuEvv9FHRWXwYA2rf3PzleS9fmGPupKL34Vm3O6WFu UlXkHZE0BWmpL3Zh/9iHMyYKzlgdAPOGsbjUOa6cQGuoZgUXIgKtiTdspbgEKCeF ++fuXupNPmH1pnwiXLjGNpjqXOtMS7qxKZBJ0XCX58x2SFr1qkvw5JGd/kJYrVwB O5xxPWLDZgzvAcijHGToNJ1+WiBRbYNXI1/mAlLjxIPxQCk0R675stl75f9HfElH KBidkYD/PxIKweHKlwLUil74NAkiRA== =xhE9 -----END PGP SIGNATURE-----
VAR-201808-0384 CVE-2018-14847 MikroTik RouterOS Authentication vulnerability CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface. MikroTik RouterOS Contains an authentication vulnerability.Information may be obtained. MikroTik RouterOS is prone to a authentication-bypass vulnerability. An attacker can exploit this issue to bypass authentication mechanism and perform unauthorized actions. This may lead to further attacks. MikroTik RouterOS version 6.42 and prior versions are vulnerable. MikroTik RouterOS is a routing operating system. Winbox for MikroTik RouterOS is an application for managing MikroTik RouterOS system
VAR-201808-0890 CVE-2018-3834 Insteon Hub Firmware access control vulnerability CVSS V2: 7.8
CVSS V3: 7.4
Severity: HIGH
An exploitable permanent denial of service vulnerability exists in Insteon Hub running firmware version 1013. The firmware upgrade functionality, triggered via PubNub, retrieves signed firmware binaries using plain HTTP requests. The device doesn't check the kind of firmware image that is going to be installed and thus allows for flashing any signed firmware into any MCU. Since the device contains different and incompatible MCUs, flashing one firmware to the wrong MCU will result in a permanent brick condition. To trigger this vulnerability, an attacker needs to impersonate the remote server "cache.insteon.com" and serve a signed firmware image. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
VAR-201808-0156 CVE-2017-16347 Insteon Hub Firmware buffer error vulnerability CVSS V2: 8.0
CVSS V3: 9.9
Severity: CRITICAL
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01e7d4 the value for the s_vol key is copied using strcpy to the buffer at 0xa0001700. This buffer is maximum 12 bytes large (this is the maximum size it could be, it is possible other global variables are stored between this variable and the next one that we could identify), sending anything longer will cause a buffer overflow. Insteon Hub The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. A buffer overflow vulnerability exists in InsteonHub using version 1012 firmware. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
VAR-201808-0150 CVE-2017-16341 Insteon Hub Buffer error vulnerability CVSS V2: 8.0
CVSS V3: 9.9
Severity: CRITICAL
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c224 the value for the s_vol_play key is copied using strcpy to the buffer at 0xa0000418. This buffer is maximum 8 bytes large (this is the maximum size it could be, it is possible other global variables are stored between this variable and the next one that we could identify), sending anything longer will cause a buffer overflow. Insteon Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. A buffer overflow vulnerability exists in InsteonHub using version 1012 firmware. Insteon Hub is an Insteon central controller product of Insteon Company in the United States