VARIoT IoT vulnerabilities database
| VAR-201807-1681 | CVE-2018-9066 | Lenovo xClarity Administrator Access control vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
In Lenovo xClarity Administrator versions earlier than 2.1.0, an authenticated LXCA user can, under specific circumstances, inject additional parameters into a specific web API call which can result in privileged command execution within LXCA's underlying operating system. Lenovo xClarity Administrator Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Lenovo XClarity Administrator (LXCA) is a set of centralized resource management solutions of China Lenovo (Lenovo). The solution supports simplified infrastructure management, faster server response, and improved Lenovo server system performance. There are security vulnerabilities in the Web API in versions earlier than Lenovo LXCA 2.1.0
| VAR-201807-1680 | CVE-2018-9065 | Lenovo xClarity Administrator Access control vulnerability |
CVSS V2: 3.5 CVSS V3: 7.5 Severity: HIGH |
In Lenovo xClarity Administrator versions earlier than 2.1.0, an attacker that gains access to the underlying LXCA file system user may be able to retrieve a credential store containing the service processor user names and passwords for servers previously managed by that LXCA instance, and potentially decrypt those credentials more easily than intended. Lenovo xClarity Administrator Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Lenovo XClarity Administrator (LXCA) is a set of centralized resource management solutions of China Lenovo (Lenovo). The solution supports simplified infrastructure management, faster server response, and improved Lenovo server system performance. There are security vulnerabilities in the Web API in versions earlier than Lenovo LXCA 2.1.0
| VAR-201807-1679 | CVE-2018-9064 | Lenovo xClarity Administrator Access control vulnerability |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
In Lenovo xClarity Administrator versions earlier than 2.1.0, an authenticated LXCA user may abuse a web API debug call to retrieve the credentials for the System Manager user. Lenovo xClarity Administrator Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Lenovo XClarity Administrator (LXCA) is a set of centralized resource management solutions of China Lenovo (Lenovo). The solution supports simplified infrastructure management, faster server response, and improved Lenovo server system performance. There are security vulnerabilities in the Web API in versions earlier than Lenovo LXCA 2.1.0
| VAR-201807-0541 | CVE-2018-13280 | Synology DiskStation Manager Vulnerable to use of insufficient random values |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
Use of insufficiently random values vulnerability in SYNO.Encryption.GenRandomKey in Synology DiskStation Manager (DSM) before 6.2-23739 allows man-in-the-middle attackers to compromise non-HTTPS sessions via unspecified vectors. Synology DiskStation Manager (DSM) is an operating system developed by Synology for network storage servers (NAS). The operating system can manage data, documents, photos, music and other information. Attackers can exploit this vulnerability to implement man-in-the-middle attacks and control non-HTTPS sessions
| VAR-201807-1683 | CVE-2018-9068 | IMM2 Vulnerabilities related to the use of hard-coded credentials |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The IMM2 First Failure Data Capture function collects management module logs and diagnostic information when a hardware error is detected. This information is made available for download through an SFTP server hosted on the IMM2 management network interface. In versions earlier than 4.90 for Lenovo System x and earlier than 6.80 for IBM System x, the credentials to access the SFTP server are hard-coded and described in the IMM2 documentation, allowing an attacker with management network access to obtain the collected FFDC data. After applying the update, the IMM2 will create random SFTP credentials for use with OneCLI. IMM2 Contains a vulnerability in the use of hard-coded credentials.Information may be obtained
| VAR-201809-0087 | CVE-2018-10602 | (0Day) Wecon LeviStudioU usermanage GroupList ID Stack-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Wecon LeviStudioU. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of UMP files. When parsing the EventSet WordAddr10 element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of Administrator. WECON LeviStudio is a set of human interface programming software from WECON, China
| VAR-201807-2075 | CVE-2018-7992 | plural HUAWEI Product buffer error vulnerability |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
Mdapt Driver of Huawei MediaPad M3 BTV-W09C128B353CUSTC128D001; Mate 9 Pro versions earlier than 8.0.0.356(C00); P10 Plus versions earlier than 8.0.0.357(C00) has a buffer overflow vulnerability. The driver does not sufficiently validate the input, an attacker could trick the user to install a malicious application which would send crafted parameters to the driver. Successful exploit could cause a denial of service condition. HuaweiMate9Pro and P10Plus are both Huawei's smartphone products. The MediaPadM3 is a tablet. There are buffer overflow vulnerabilities in Huawei's various products, and the driver failed to fully verify the program's input. Mdapt Driver is one of the dithering effect drivers
| VAR-201807-2271 | No CVE | D-Link DAP-1360 File Path Traversal and Cross-Site Scripting Vulnerability |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The D-Link DAP-1360 is a wireless router. D-LinkDAP-1360 has file path traversal and cross-site scripting vulnerabilities that allow remote attackers to read passwords with incorrect parameters, resulting in absolute path traversal attacks.
| VAR-201807-0100 | CVE-2017-10937 | ZTE ZXIPTV-UCM SQL Injection Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
SQL injection vulnerability in all versions prior to V2.01.05.09 of the ZTE ZXIPTV-UCM product allows remote attackers to execute arbitrary SQL commands via the opertype parameter, resulting in the disclosure of database information. ZTE ZXIPTV-UCM The product includes SQL An injection vulnerability exists.Information may be obtained. ZTEZXIPTV-UCM is a set-top box device from China ZTE Corporation (ZTE)
| VAR-201807-0099 | CVE-2017-10936 | ZTE ZXCDN-SNS SQL Injection Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
SQL injection vulnerability in all versions prior to V4.01.01 of the ZTE ZXCDN-SNS product allows remote attackers to execute arbitrary SQL commands via the aoData parameter, resulting in the disclosure of database information. ZTE ZXCDN-SNS Products include SQL An injection vulnerability exists.Information may be obtained. ZTEZXCDN-SNS is a hardware device of China ZTE Corporation (ZTE)
| VAR-201807-0098 | CVE-2017-10935 | ZTE ZXR10 1800-2S Vulnerabilities related to certificate and password management in products |
CVSS V2: 4.0 CVSS V3: 7.2 Severity: HIGH |
All versions prior to ZSRV2 V3.00.40 of the ZTE ZXR10 1800-2S products allow remote authenticated users to bypass the original password authentication protection to change other user's password. ZTE ZXR10 1800-2S There are vulnerabilities related to certificate / password management and authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZTEZXR101800-2SZSRV2 is a router product of China ZTE Corporation (ZTE)
| VAR-201807-0097 | CVE-2017-10934 | ZTE ZXIPTV-EPG Vulnerable to unreliable data deserialization |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
All versions prior to V5.09.02.02T4 of the ZTE ZXIPTV-EPG product use the Java RMI service in which the servers use the Apache Commons Collections (ACC) library that may result in Java deserialization vulnerabilities. An unauthenticated remote attacker can exploit the vulnerabilities by sending a crafted RMI request to execute arbitrary code on the target host. ZTE ZXIPTV-EPG Contains a vulnerability in the deserialization of unreliable data.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZTEZXIPTV-EPG A set-top box device from China ZTE Corporation (ZTE). A Java deserialization vulnerability exists in previous versions of ZTEZXIPTV-EPG5.09.02.02T4. The vulnerability stems from the use of the JavaRMI service. Execute arbitrary code
| VAR-201807-2203 | CVE-2018-5538 | plural F5 BIG-IP Vulnerabilities related to security functions in products |
CVSS V2: 4.3 CVSS V3: 3.7 Severity: LOW |
On F5 BIG-IP DNS 13.1.0-13.1.0.7, 12.1.3-12.1.3.5, DNS Express / DNS Zones accept NOTIFY messages on the management interface from source IP addresses not listed in the 'Allow NOTIFY From' configuration parameter when the db variable "dnsexpress.notifyport" is set to any value other than the default of "0". plural F5 BIG-IP The product contains vulnerabilities related to security functions.Information may be tampered with. F5BIG-IP is an all-in-one network device that integrates network traffic management, application security management, load balancing and other functions. BIG-IPDNS is one of the traffic managers. A security vulnerability exists in F5BIG-IPDNS version 13.1.0 to 13.1.0.7 and 12.1.3 to 12.1.3.5. The vulnerability stems from setting the database variable 'dnsexpress.notifyport' to something other than the default '0' value. The source IP address of the NOTIF message received by DNSExpress/DNSZones on the management interface is not in the configuration parameter 'AllowNOTIFYFrom'. This vulnerability could be exploited by an attacker to cause DNS Express to continuously detect updates. Multiple F5 BIG-IP Products are prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks
| VAR-201807-2207 | CVE-2018-5531 | plural F5 BIG-IP Vulnerability related to input validation in products |
CVSS V2: 6.1 CVSS V3: 7.4 Severity: HIGH |
Through undisclosed methods, on F5 BIG-IP 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.0-11.6.3.1, or 11.2.1-11.5.6, adjacent network attackers can cause a denial of service for VCMP guest and host systems. Attack must be sourced from adjacent network (layer 2). plural F5 BIG-IP The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP is an all-in-one network device from F5 in the United States that integrates network traffic management, application security management, load balancing and other functions.
There are security vulnerabilities in F5 BIG-IP. Multiple F5 BIG-IP products are prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause a a denial-of-service condition. The following versions are affected: F5 BIG-IP version 13.0.0 to 13.1.0.7, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1, 11.2.1 to 11.5.6
| VAR-201807-2199 | CVE-2018-5530 | plural F5 BIG-IP Product depletion vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, or 11.6.0-11.6.3.1 virtual servers with HTTP/2 profiles enabled are vulnerable to "HPACK Bomb". plural F5 BIG-IP The product is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP Products are prone to a denial-of-service vulnerability.
Exploiting this issue allows remote attackers to cause a denial-of-service condition due to excessive memory consumption. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager. When the HTTP/2 configuration file is enabled, an attacker can exploit this vulnerability to cause denial of service (abnormal value of consumed memory resources). The following versions are affected: F5 BIG-IP LTM version 13.0.0 to 13.1.0.5, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1; BIG-IP AAM 13.0.0 to 13.1 .0.5, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1; BIG-IP AFM 13.0.0 to 13.1.0.5, 12.1.0 to 12.1.3.5, 11.6. 0 to 11.6.3.1; BIG-IP Analytics 13.0.0 to 13.1.0.5, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1; BIG-IP APM 13.0.0 to version 13.1.0.5, version 12.1.0 to version 12.1.3.5, version 11.6.0 to version 11.6.3.1; BIG-IP ASM version 13.0.0 to version 13.1.0.5, version 12.1.0 to version 12.1.3.5, 11.6.0 to 11.6.3.1; BIG-IP Edge Gateway 13.0.0 to 13.1.0.5, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1; BIG-IP PEM; BIG-IP WebSafe version 13.0.0 to version 13.1.0.5, version 12.1.0 to version 12.1.3.5, version 11.6.0 to version 11.6.3.1
| VAR-201807-2202 | CVE-2018-5537 | plural F5 Vulnerability related to input validation in products |
CVSS V2: 2.6 CVSS V3: 5.3 Severity: MEDIUM |
A remote attacker may be able to disrupt services on F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.1, or 11.2.1-11.5.6 if the TMM virtual server is configured with a HTML or a Rewrite profile. TMM may restart while processing some specially prepared HTML content from the back end. plural F5 The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5BIG-IP is an all-in-one network device that integrates network traffic management, application security management, load balancing and other functions. There is a security hole in F5BIG-IP. A security vulnerability exists in the F5 BIG-IP. The following versions are affected: F5 BIG-IP version 13.0.0 to 13.1.0.5, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1, 11.2.1 to 11.5.6
| VAR-201807-2194 | CVE-2018-5542 | plural F5 BIG-IP Vulnerability related to input validation in products |
CVSS V2: 6.8 CVSS V3: 8.1 Severity: HIGH |
F5 BIG-IP 13.0.0-13.0.1, 12.1.0-12.1.3.6, or 11.2.1-11.6.3.2 HTTPS health monitors do not validate the identity of the monitored server. plural F5 BIG-IP The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager. An attacker could exploit this vulnerability to disclose and modify the monitor's traffic. The following versions are affected: F5 BIG-IP LTM version 13.0.0 to 13.0.1, 12.1.0 to 12.1.3.6, 11.2.1 to 11.6.3.2; BIG-IP AAM 13.0.0 to 13.0 .1 version, 12.1.0 to 12.1.3.6, 11.2.1 to 11.6.3.2; BIG-IP AFM 13.0.0 to 13.0.1, 12.1.0 to 12.1.3.6, 11.2. 1 to 11.6.3.2; BIG-IP Analytics 13.0.0 to 13.0.1, 12.1.0 to 12.1.3.6, 11.2.1 to 11.6.3.2; BIG-IP APM 13.0.0 to version 13.0.1, version 12.1.0 to version 12.1.3.6, version 11.2.1 to version 11.6.3.2; BIG-IP ASM version 13.0.0 to version 13.0.1, version 12.1.0 to version 12.1.3.6, 11.2.1 to 11.6.3.2; BIG-IP DNS 13.0.0 to 13.0.1, 12.1.0 to 12.1.3.6, 11.2.1 to 11.6.3.2; BIG-IP Edge Gateway 13.0 .0 to 13.0.1, 12.1.0 to 12.1.3.6, 11.2.1 to 11.6.3.2; BIG-IP FPS 13.0.0 to 13.0.1, 12.1.0 to 12.1. Version 3.6, version 11.2.1 to 11.6.3
| VAR-201807-0407 | CVE-2018-14083 | LICA miniCMTS E8K Information disclosure vulnerability in devices |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
LICA miniCMTS E8K(u/i/...) devices allow remote attackers to obtain sensitive information via a direct POST request for the inc/user.ini file, leading to discovery of a password hash. LICA miniCMTS E8K The device contains an information disclosure vulnerability.Information may be obtained. Zhejiang Lanlian Technology Co., Ltd. ("Lianlian Technology") was established in 2009. It is a high-tech enterprise that provides cable two-way network transformation solutions.
Zhejiang Lanlian Technology Mini-Cmts has a directory traversal vulnerability, which can be used by attackers to obtain sensitive information. LICA miniCMTS E8K is a modem device from LICA, Czech Republic. A security vulnerability exists in LICA miniCMTS E8K
| VAR-201807-2274 | No CVE | Davolink DVW 3200 Router Password Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The DVW3200 is a router product from Davolink. A password leak vulnerability exists in the Davolink DVW3200 router, which allows an attacker to exploit sensitive information.
| VAR-201807-2204 | CVE-2018-5539 | F5 BIG-IP ASM Input validation vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Under certain conditions, on F5 BIG-IP ASM 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.0-11.6.3.1, 11.5.1-11.5.6, or 11.2.1, when processing CSRF protections, the BIG-IP ASM bd process may restart and produce a core file. F5 BIG-IP ASM Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP ASM is prone to a remote denial-of-service vulnerability.
Successful exploits may allow an attackers to cause the affected device to restart, denying service to legitimate users. F5 BIG-IP ASM (Application Security Manager) is a Web Application Firewall (WAF) of F5 Corporation in the United States. It provides secure remote access, protects emails, simplifies Web access control, and enhances network and application performance. An attacker could exploit this vulnerability to cause the affected BIG-IP ASM system to be unable to process traffic. Affected by version: F5 BIG-IP ASM 13.0.0 to 13.1.0.7, 12.1.0 to 12.1.3.5, 11.6.0 to 11.6.3.1, 11.5.1 to 11.5.6, Version 11.2.1