VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201702-1069 CVE-2017-6206 D-Link DGS-1510 Websmart In device firmware Unauthenticated Information Disclosure Attacked vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DGS-1510-28, and DGS-1510-20 Websmart devices with firmware before 1.31.B003 allow attackers to conduct Unauthenticated Information Disclosure attacks via unspecified vectors. D-Link DGS-1510-28XMP and so on are D-Link's Ethernet switches. Security vulnerabilities exist in several D-Link DGS-1510 Websmart devices, allowing remote attackers to exploit this vulnerability to submit special requests for sensitive information. Multiple D-Link products are prone to an unspecified information-disclosure vulnerability. D-Link DGS-1510-28XMP, etc. The following devices are affected: D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DGS-1510-28, DGS-1510-20
VAR-201705-3544 CVE-2017-6137 plural F5 BIG-IP Product Access control vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, PSM, WebAccelerator, and WebSafe 11.6.1 HF1, 12.0.0 HF3, 12.0.0 HF4, and 12.1.0 through 12.1.2, undisclosed traffic patterns received while software SYN cookie protection is engaged may cause a disruption of service to the Traffic Management Microkernel (TMM) on specific platforms and configurations. plural F5 BIG-IP Product Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5BIG-IP is a load balancer that uses a variety of allocation algorithms to distribute network requests to available servers in a server cluster. By managing incoming web data traffic and increasing effective network bandwidth, network visitors get as much as possible. The hardware device for the best networking experience. A F5BIG-IPTCP packet has a denial of service vulnerability that remote users can use to send a specially crafted sequence of packets, causing the target traffic management microkernel (TMM) to be interrupted. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. LTM is a local traffic manager; APM is a solution that provides secure unified access to business-critical applications and networks. Security flaws exist in several F5 products. An attacker could exploit this vulnerability to compromise services used by the Traffic Management Microkernel (TMM). The following products and versions are affected: F5 BIG-IP LTM Release 11.6.1 HF1, Release 12.0.0 HF3, Release 12.0.0 HF4, Release 12.1.0 through Release 12.1.2; BIG-IP AAM Release 11.6.1 HF1, 12.0.0 HF3 release, 12.0.0 HF4 release, 12.1.0 to 12.1.2 release; BIG-IP AFM 11.6.1 HF1 release, 12.0.0 HF3 release, 12.0.0 HF4 release, 12.1.0 to 12.1 release .2 releases; BIG-IP Analytics 11.6.1 HF1 release, 12.0.0 HF3 release, 12.0.0 HF4 release, 12.1.0 through 12.1.2 releases; BIG-IP APM 11.6.1 HF1 release, 12.0.0 HF3 release Version, version 12.0.0 HF4, version 12.1.0 to version 12.1.2; BIG-IP ASM version 11.6.1 HF1, version 12.0.0 HF3, version 12.0.0 HF4, version 12.1.0 to version 12.1.2; BIG-IP DNS Version 12.0.0 HF3, Version 12.0.0 HF4, Versions 12.1.0 to 12.1.2; BIG-IP GTM Version 11.6.1 HF1; BIG-IP Link Controller Version 11.6.1 HF1, Version 12.0.0 HF3 release, 12.0.0 HF4 release, 12.1.0 to 12.1.2 release; BIG-IP PEM 11.6.1 HF1 release, 12.0.0 HF3 release, 12.0.0 HF4 release, 12.1.0 to 12.1.2 release ; BIG-IP WebSafe Version 11.6.1 HF1, Version 12.0.0 HF3, Version 12.0.0 HF4, Versions 12.1.0 through 12
VAR-201705-3545 CVE-2017-6128 plural F5 Access control vulnerabilities in products CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An attacker may be able to cause a denial-of-service (DoS) attack against the sshd component in F5 BIG-IP, Enterprise Manager, BIG-IQ, and iWorkflow. plural F5 The product contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5BIG-IP is a load balancer that uses a variety of allocation algorithms to distribute network requests to available servers in a server cluster. By managing incoming web data traffic and increasing effective network bandwidth, network visitors get as much as possible. The hardware device for the best networking experience. There is a denial of service vulnerability in F5BIG-IP products. An attacker could exploit the vulnerability to restart the device, resulting in a denial of service. Multiple F5 BIG-IP products are prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause denial-of-service condition. F5 BIG-IP and so on are all products of F5 Company in the United States. Among them, F5 BIG-IP is an all-in-one network device that integrates functions such as network traffic management, application security management, and load balancing. Enterprise Manager is a tool that provides visibility into the entire BIG-IP application delivery infrastructure and optimizes application performance. F5 BIG-IQ is a software-based cloud management solution. The solution supports the deployment of application delivery and network services across public and private clouds, traditional data centers and hybrid environments. iWorkflow is a virtual appliance that serves as a platform for deploying application delivery strategies
VAR-201705-3546 CVE-2017-6131 F5 BIG-IP Vulnerabilities related to the use of hard-coded credentials CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
In some circumstances, an F5 BIG-IP version 12.0.0 to 12.1.2 and 13.0.0 Azure cloud instance may contain a default administrative password which could be used to remotely log into the BIG-IP system. The impacted administrative account is the Azure instance administrative user that was created at deployment. The root and admin accounts are not vulnerable. An attacker may be able to remotely access the BIG-IP host via SSH. F5 BIG-IP Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5BIG-IP is a load balancer that uses a variety of allocation algorithms to distribute network requests to available servers in a server cluster. By managing incoming web data traffic and increasing effective network bandwidth, network visitors get as much as possible. The hardware device for the best networking experience. A default password vulnerability exists in F5BIG-IP products. F5 BIG-IP Azure Products are prone to a security-bypass vulnerability. This may lead to further attacks. F5 BIG-IP LTM, etc. LTM is a local traffic manager; APM is a solution that provides secure unified access to business-critical applications and networks. The following products and versions are affected: F5 BIG-IP LTM version 12.0.0 through 12.1.2, version 13.0.0; BIG-IP AAM version 12.0.0 through 12.1.2, version 13.0.0; BIG-IP AFM Version 12.0.0 to Version 12.1.2, Version 13.0.0; BIG-IP APM Version 12.0.0 to Version 12.1.2, Version 13.0.0; BIG-IP ASM Version 12.0.0 to Version 12.1.2, Version 13.0. 0 version; BIG-IP DNS version 12.0.0 to 12.1.2, version 13.0.0; BIG-IP Link Controller version 12.0.0 to 12.1.2, version 13.0.0; BIG-IP PEM version 12.0.0 to version 12.1.2, version 13.0.0; BIG-IP WebSafe version 12.0.0 to version 12.1.2, version 13.0.0
VAR-201804-0507 CVE-2017-6143 F5 BIG-IP Vulnerabilities related to certificate validation CVSS V2: 5.8
CVSS V3: 5.4
Severity: MEDIUM
X509 certificate verification was not correctly implemented in the IP Intelligence Subscription and IP Intelligence feed-list features, and thus the remote server's identity is not properly validated in F5 BIG-IP 12.0.0-12.1.2, 11.6.0-11.6.2, or 11.5.0-11.5.5. F5 BIG-IP Contains a certificate validation vulnerability.Information may be obtained and information may be altered. Both F5 BIG-IP AFM and ASM are products of F5 Company in the United States. F5 BIG-IP AFM is an advanced firewall product for mitigating DDos attacks. ASM is a web application firewall (WAF) that provides secure remote access, protects email, and simplifies web access control while enhancing network and application performance. There is a security vulnerability in F5 BIG-IP AFM and ASM, which is caused by the program not correctly verifying the identity of the remote server. An attacker could exploit this vulnerability to take control of intelligence data. The following products and versions are affected: F5 BIG-IP AFM version 12.1.0 to 12.1.2, 11.6.1 to 11.6.2, 11.5.1 to 11.5.5; BIG-IP ASM version 12.1.0 to version 12.1.2, version 11.6.1 to version 11.6.2, version 11.5.1 to version 11.5.5
VAR-201712-0676 CVE-2017-6129 F5 BIG-IP APM Software input validation vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
In F5 BIG-IP APM software version 13.0.0 and 12.1.2, in some circumstances, APM tunneled VPN flows can cause a VPN/PPP connflow to be prematurely freed or cause TMM to stop responding with a "flow not in use" assertion. An attacker may be able to disrupt traffic or cause the BIG-IP system to fail over to another device in the device group. F5 BIG-IP APM The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP APM is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. F5 BIG-IP Access Policy Manager (APM) is a set of access and security solutions from F5 Corporation of the United States. The solution provides unified access to business-critical applications and networks
VAR-201712-0669 CVE-2017-6139 F5 BIG-IP APM Vulnerability related to information leakage from log files in software CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In F5 BIG-IP APM software version 13.0.0 and 12.1.2, under rare conditions, the BIG-IP APM system appends log details when responding to client requests. Details in the log file can vary; customers running debug mode logging with BIG-IP APM are at highest risk. F5 BIG-IP APM is prone to an information-disclosure vulnerability. Successfully exploiting this issue may allow attackers to obtain sensitive information. This may lead to other attacks. Pulse Connect Secure and Desktop Client are prone to a local information-disclosure vulnerability. The following versions and products are vulnerable: Versions prior to Desktop Client 9.0R3, and 5.3R7 Versions prior to Pulse Connect Secure 9.0R3, 8.3R7, and 8.1R14. F5 BIG-IP Access Policy Manager (APM) is a set of access and security solutions from F5 Corporation of the United States. The solution provides unified access to business-critical applications and networks
VAR-201710-1064 CVE-2017-6144 F5 BIG-IP PEM Vulnerabilities in certificate validation CVSS V2: 5.8
CVSS V3: 7.4
Severity: HIGH
In F5 BIG-IP PEM 12.1.0 through 12.1.2 when downloading the Type Allocation Code (TAC) database file via HTTPS, the server's certificate is not verified. Attackers in a privileged network position may be able to launch a man-in-the-middle attack against these connections. TAC databases are used in BIG-IP PEM for Device Type and OS (DTOS) and Tethering detection. Customers not using BIG-IP PEM, not configuring downloads of TAC database files, or not using HTTP for that download are not affected. F5 BIG-IP PEM Contains a certificate validation vulnerability.The information may be obtained and the information may be falsified. Multiple F5 BIG-IP Products are prone to a security-bypass vulnerability. Successfully exploiting this issue may allow attackers to perform unauthorized actions. This may lead to other attacks. F5 BIG-IP is an all-in-one network device integrated with network traffic management, application security management, load balancing and other functions from F5 Corporation of the United States. PEM is one of the Policy Enforcement Managers. Attackers can use this vulnerability to implement man-in-the-middle attacks to tamper with data or obtain information
VAR-201704-1018 CVE-2017-6130 F5 SSL Intercept iApp and SSL Orchestrator Vulnerable to server-side request forgery CVSS V2: 5.8
CVSS V3: 7.4
Severity: HIGH
F5 SSL Intercept iApp 1.5.0 - 1.5.7 and SSL Orchestrator 2.0 is vulnerable to a Server-Side Request Forgery (SSRF) attack when deployed using the Dynamic Domain Bypass (DDB) feature feature plus SNAT Auto Map option for egress traffic. The former is a set of templates for configuring outbound security devices for decrypting SSL traffic in LTM; the latter is a set of solutions designed to optimize SSL infrastructure and provide security devices. Attackers can exploit this vulnerability to implement server-side request forgery attacks
VAR-201702-1099 No CVE TP-Link C2 and C20i Default Credential Design Vulnerabilities CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
TP-Link is a Chinese network equipment manufacturer such as routers and IOT equipment. There is a default credential design vulnerability in the VS-LinkC2 and C20i vsftpdFTP servers. An attacker can exploit the vulnerability to execute the system() command multiple times and run with root privileges.
VAR-201704-1325 CVE-2017-8219 TP-Link C2 and C20i Vulnerability related to input validation in device firmware CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI. TP-Link C2 and C20i There is an input validation vulnerability in the device firmware.Service operation interruption (DoS) An attack may be carried out. TP-Link is a Chinese network equipment manufacturer such as routers and IOT equipment. A denial of service vulnerability exists in TP-LinkC2 and C20i. An attacker could exploit the vulnerability by sending an HTTP request to the affected device, causing the HTTP server to crash, causing a denial of service. Both TP-Link C2 and C20i are routers manufactured by China Pulian (TP-LINK). TP-Link C2 and C20i with 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n and earlier firmware have security vulnerabilities
VAR-201702-1093 No CVE There is a SQL injection vulnerability in the Haixian Zhikang basic platform CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Haixie Zhikang Basic Platform is a management system for catering and medicine. There is a SQL injection vulnerability in the login site of Haixie Zhikang's basic platform. Attackers can use the vulnerability to obtain sensitive information on the website database.
VAR-201702-1102 No CVE D-Link ADSL Router Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
D-LinkADSLRouterDSL-2730U, DSL-2750U, DSL-2750E are a variety of wireless router products. The D-LinkADSL router has an information disclosure vulnerability that allows an attacker to exploit sensitive information.
VAR-201712-0667 CVE-2017-6094 Genexis GAPS Vulnerable to information disclosure CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
CPEs used by subscribers on the access network receive their individual configuration settings from a central GAPS instance. A CPE identifies itself by the MAC address of its WAN interface and a certain "chk" value (48bit) derived from the MAC. The algorithm used to compute the "chk" was disclosed by reverse engineering the CPE's firmware. As a result, it is possible to forge valid "chk" values for any given MAC address and therefore receive the configuration settings of other subscribers' CPEs. The configuration settings often contain sensitive values, for example credentials (username/password) for VoIP services. This issue affects Genexis B.V. GAPS up to 7.2. Genexis GAPS Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. GenexisAutomaticProvisioning System (GAPS) is a system of GENEXIS in the Netherlands for automatically configuring routers and networks. An access control vulnerability exists in GAPS 7.2 and earlier. An attacker could use this vulnerability to obtain configuration information (user credentials)
VAR-201705-3536 CVE-2017-6079 Edgewater Networks Edgemarc Command injection vulnerability in the appliance CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that allows for user-defined commands such as specific iptables routes, etc., to be set. You can use this page as a web shell essentially to execute commands, though you get no feedback client-side from the web application: if the command is valid, it executes. An example is the wget command. The page that allows this has been confirmed in firmware as old as 2006. Edgewater Networks Edgemarc The appliance contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Edgewater Networks Edgemarc is the device of Edgewater Networks. There are arbitrary command injection vulnerabilities in EdgewaterNetworksEdgemarc. An attacker could exploit this vulnerability to inject arbitrary commands into the context of an affected application, causing further attacks. HTTP web-management appliance is one of the HTTP Web management programs. A security vulnerability exists in the HTTP web-management application on Edgewater Networks Edgemarc devices
VAR-201702-0960 CVE-2017-6127 DigiSol DG-HR1400 Wireless Router Cross-Site Request Forgery Vulnerability

Related entries in the VARIoT exploits database: VAR-E-201702-0538
CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
Multiple cross-site request forgery (CSRF) vulnerabilities in the access portal on the DIGISOL DG-HR1400 Wireless Router with firmware 1.00.02 allow remote attackers to hijack the authentication of administrators for requests that (1) change the SSID, (2) change the Wi-Fi password, or (3) possibly have unspecified other impact via crafted requests to form2WlanBasicSetup.cgi. The DigiSolDG-HR1400 WirelessRouter is a wireless broadband home router. A cross-site request forgery vulnerability exists in the accessportal of DigiSolDG-HR1400 WirelessRouter. Allows remote attackers to build malicious URIs, entice users to resolve, and perform malicious actions in the target user context. DIGISOL DG-HR1400 is prone to multiple cross-site request-forgery vulnerabilities. This may lead to further attacks. DG-HR1400 1.00.02 is vulnerable; other versions may also be affected
VAR-201704-1571 CVE-2017-7689 Schneider Electric homeLYnk Controller Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A Command Injection vulnerability in Schneider Electric homeLYnk Controller exists in all versions before 1.5.0. A remote attacker exploited the vulnerability to obtain sensitive information. An attacker can exploit this issue to execute arbitrary commands on the affected system with root privileges. This may aid in further attacks
VAR-201702-0952 CVE-2017-6077 NETGEAR DGN2200 Device firmware ping.cgi In any OS Command execution vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
ping.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ping_IPAddr field of an HTTP POST request. The NETGEARDGN2200 is an ADSL router device. There are arbitrary command execution vulnerabilities in ping.cgi in the NETGEARDGN220010.0.0.50 version. NETGEAR DGN2200 is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. NETGEAR DGN2200 10.0.0.50 is vulnerable. There is a security vulnerability in the ping.cgi file in NETGEAR DGN2200 with firmware version 10.0.0.50 and earlier
VAR-201702-0159 CVE-2016-10227 Zyxel USG50 Security Appliance and NWA3560-N Access Point Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Zyxel USG50 Security Appliance and NWA3560-N Access Point allow remote attackers to cause a denial of service (CPU consumption) via a flood of ICMPv4 Port Unreachable packets. ZyXELUSG50 and others are products of ZyXEL Technology. The ZyXELUSG50 is a firewall product. ZyXELNWA3560-N is a switch product. A remote denial of service vulnerability exists in several Zyxel products. Both Zyxel USG50 Security Appliance and NWA3560-N Access Point are products of Zyxel. The former is a set of network security firewall equipment, and the latter is a wireless access point product. Security vulnerabilities exist in Zyxel USG50 Security Appliance and NWA3560-N Access Point
VAR-201704-0063 CVE-2016-10226 Safari Technology Preview Distributed by WebKit of JavaScriptCore Service disruption in (DoS) Vulnerabilities CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
JavaScriptCore in WebKit, as distributed in Safari Technology Preview Release 18, allows remote attackers to cause a denial of service (bitfield out-of-bounds read and application crash) via crafted JavaScript code that is mishandled in the operatorString function, related to assembler/MacroAssemblerARM64.h, assembler/MacroAssemblerX86Common.h, and wasm/WasmB3IRGenerator.cpp. Apple Safari Technology Preview is a browser of Apple (Apple). WebKit is an open source web browser engine developed by the KDE community and is currently used by browsers such as Apple Safari and Google Chrome. There is a security vulnerability in the JavaScriptCore of WebKit released in Apple Safari Technology Preview Release 18