VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201804-1268 CVE-2018-7241 plural Schneider Electric Vulnerabilities related to the use of hard-coded credentials in products CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Hard coded accounts exist in Schneider Electric's Modicon Premium, Modicon Quantum, Modicon M340, and BMXNOR0200 controllers in all versions of the communication modules. plural Schneider Electric The product contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric Modicon Premium\\Modicon Quantum\\Modicon M340\\Modicon BMXNOR0200 is a programmable controller product from Schneider Electric, France. A number of Schneider Electric products have a hard-coded certificate vulnerability that stems from the fact that the FTP server contains a hard-coded account that allows an attacker to exploit the vulnerability to perform unauthorized access. Multiple Schneider Electric Modicon products are prone to a remote security vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. The vulnerability stems from the presence of hard-coded accounts in the program
VAR-201803-1313 CVE-2017-15325 Huawei Smart Phone Software integer overflow vulnerability CVSS V2: 9.3
CVSS V3: 7.8
Severity: HIGH
The Bdat driver of Prague smart phones with software versions earlier than Prague-AL00AC00B211, versions earlier than Prague-AL00BC00B211, versions earlier than Prague-AL00CC00B211, versions earlier than Prague-TL00AC01B211, versions earlier than Prague-TL10AC01B211 has integer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP and execute it as a specific privilege; the APP can then send a specific parameter to the driver of the smart phone, causing arbitrary code execution. Huawei Smart Phone Software contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei Glory 8 Youth Edition is a smart phone device. The Huawei Glory 8 Youth Edition Bdat driver has an integer overflow vulnerability
VAR-201803-1905 CVE-2018-8931 plural AMD Access control vulnerabilities in products CVSS V2: 9.3
CVSS V3: 9.0
Severity: CRITICAL
The AMD Ryzen, Ryzen Pro, and Ryzen Mobile processor chips have insufficient access control for the Secure Processor, aka RYZENFALL-1. AMD Ryzen and so on are a central processing unit (CPU) of AMD in the United States. An attacker could exploit this vulnerability to perform write operations to protected memory areas
VAR-201803-1910 CVE-2018-8936 plural AMD Vulnerabilities related to authorization, authority, and access control in products CVSS V2: 9.3
CVSS V3: 9.0
Severity: CRITICAL
The AMD EPYC Server, Ryzen, Ryzen Pro, and Ryzen Mobile processor chips allow Platform Security Processor (PSP) privilege escalation. plural AMD The product contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AMD EPYC Server, etc. are all central processing unit (CPU) products of AMD in the United States. Security flaws exist in several AMD products. An attacker could exploit this vulnerability to elevate privileges. The following products are affected: AMD EPYC Server; Ryzen; Ryzen Pro; Ryzen Mobile
VAR-201803-1816 CVE-2018-5504 plural F5 BIG-IP Data processing vulnerabilities in products CVSS V2: 9.3
CVSS V3: 8.1
Severity: HIGH
In some circumstances, the Traffic Management Microkernel (TMM) does not properly handle certain malformed Websockets requests/responses, which allows remote attackers to cause a denial-of-service (DoS) or possible remote code execution on the F5 BIG-IP system running versions 13.0.0 - 13.1.0.3 or 12.1.0 - 12.1.3.1. plural F5 BIG-IP The product contains data processing vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager. A security vulnerability exists in several F5 products. The vulnerability stems from the program not properly handling malformed Websockets requests/responses. A remote attacker could exploit this vulnerability to cause a denial of service or execute code. The following products and versions are affected: F5 BIG-IP LTM version 13.0.0 to 13.1.0.3 and 12.1.0 to 12.1.3.1; BIG-IP AAM version 13.0.0 to 13.1.0.3 and 12.1.0 to 12.1.3.1; BIG-IP AFM 13.0.0 to 13.1.0.3 and 12.1.0 to 12.1.3.1; BIG-IP Analytics 13.0.0 to 13.1.0.3 and 12.1.0 to 12.1 .3.1 versions; BIG-IP APM versions 13.0.0 through 13.1.0.3 and 12.1.0 through 12.1.3.1; BIG-IP ASM versions 13.0.0 through 13.1.0.3 and 12.1.0 through 12.1.3.1 Versions; BIG-IP DNS 13.0.0 to 13.1.0.3 and 12.1.0 to 12.1.3.1; BIG-IP Edge Gateway 13.0.0 to 13.1.0.3 and 12.1.0 to 12.1.3.1 ; BIG-IP GTM versions 13.0.0 to 13.1.0.3 and 12.1.0 to 12.1.3.1; BIG-IP Link Controller 13.0.0 to 13.1.0.3 and 12.1.0 to 12.1.3.1;BIG-IP PEM Versions 13.0.0 through 13.1.0.3 and 12.1.0 through 12.1.3.1; BIG-IP WebAccelerator Versions 13.0.0 through 13.1.0.3 and 12.1.0 through 12.1.3.1; BIG- IP WebSafe versions 13.0.0 to 13.1.0.3 and 12.1.0 to 12.1.3.1
VAR-201804-1269 CVE-2018-7242 plural Schneider Electric Vulnerability related to cryptographic strength in products CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
Vulnerable hash algorithms exists in Schneider Electric's Modicon Premium, Modicon Quantum, Modicon M340, and BMXNOR0200 controllers in all versions of the communication modules. The algorithm used to encrypt the password is vulnerable to hash collision attacks. plural Schneider Electric The product contains a vulnerability related to cryptographic strength.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric Modicon Premium\\Modicon Quantum\\Modicon M340\\Modicon BMXNOR0200 is a programmable controller product from Schneider Electric, France. A number of Schneider Electric products have a weak encryption algorithm vulnerability that stems from the fact that the FTP server does not limit the length of the command parameters, which can cause buffer overflows. Multiple Schneider Electric Modicon products are prone to a remote security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks
VAR-201804-1275 CVE-2018-7240 Schneider Electric Multiple Product Stack Buffer Overflow Vulnerabilities CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
A vulnerability exists in Schneider Electric's Modicon Quantum in all versions of the communication modules which could allow arbitrary code execution. An FTP command used to upgrade the firmware of the module can be misused to cause a denial of service, or in extreme cases, to load a malicious firmware. Schneider Electric Modicon Quantum Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric Modicon Premium\\Modicon Quantum\\Modicon M340\\Modicon BMXNOR0200 is a programmable controller product from Schneider Electric, France. A stack buffer overflow vulnerability exists in several Schneider Electric products due to the fact that the FTP server does not limit the length of command parameters, which can cause buffer overflows. A remote attacker can exploit this issue to cause a denial-of-service condition. Given the nature of this issue, attackers may also be able to execute arbitrary code, but this has not been confirmed
VAR-201803-1002 CVE-2017-0934 Ubiquiti Networks EdgeOS Vulnerabilities related to authorization, permissions, and access control CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Ubiquiti Networks EdgeOS version 1.9.1 and prior suffer from an Improper Privilege Management vulnerability due to the lack of protection of the file system leading to sensitive information being exposed. An attacker with access to an operator (read-only) account could escalate privileges to admin (root) access in the system. Ubiquiti Networks EdgeOS Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Ubiquiti Networks EdgeOS is an operating system of Ubiquiti Networks that runs on Ubiquiti products. A security vulnerability exists in Ubiquiti Networks EdgeOS 1.9.1 and earlier versions. The vulnerability stems from the program's lack of protection for the file system. An attacker could exploit this vulnerability to obtain sensitive information and elevate to administrator privileges
VAR-201803-1001 CVE-2017-0933 Ubiquiti Networks EdgeOS Vulnerable to cross-site request forgery CVSS V2: 8.5
CVSS V3: 8.0
Severity: HIGH
Ubiquiti Networks EdgeOS version 1.9.1 and prior suffer from a Cross-Site Request Forgery (CSRF) vulnerability. An attacker with access to an operator (read-only) account could lure an admin (root) user to access the attacker-controlled page, allowing the attacker to gain admin privileges in the system. Ubiquiti Networks EdgeOS Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Ubiquiti Networks EdgeOS is an operating system of Ubiquiti Networks that runs on Ubiquiti products
VAR-201803-1003 CVE-2017-0935 Ubiquiti Networks EdgeOS Vulnerabilities related to authorization, permissions, and access control CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Ubiquiti Networks EdgeOS version 1.9.1.1 and prior suffer from an Improper Privilege Management vulnerability due to the lack of protection of the file system leading to sensitive information being exposed. An attacker with access to an operator (read-only) account could escalate privileges to admin (root) access in the system. Ubiquiti Networks EdgeOS Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Ubiquiti Networks EdgeOS is an operating system of Ubiquiti Networks that runs on Ubiquiti products. A security vulnerability exists in Ubiquiti Networks EdgeOS 1.9.1.1 and earlier versions. The vulnerability stems from the program's lack of protection for the file system. An attacker could exploit this vulnerability to obtain sensitive information and elevate to administrator privileges
VAR-201803-1000 CVE-2017-0932 Ubiquiti Networks EdgeOS Vulnerabilities related to authorization, permissions, and access control CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Ubiquiti Networks EdgeOS version 1.9.1.1 and prior suffer from an Improper Privilege Management vulnerability due to the lack of validation on the input of the Feature functionality. An attacker with access to an operator (read-only) account and ssh connection to the devices could escalate privileges to admin (root) access in the system. Ubiquiti Networks EdgeOS Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Ubiquiti Networks EdgeOS is an operating system of Ubiquiti Networks that runs on Ubiquiti products. A security vulnerability exists in Ubiquiti Networks EdgeOS 1.9.1.1 and earlier versions. The vulnerability is caused by the program not validating the input to the security function. An attacker could exploit this vulnerability to elevate privileges to administrator (root) privileges
VAR-201803-1745 CVE-2018-1429 IBM MQ Appliance Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
IBM MQ Appliance 9.0.1, 9.0.2, 9.0.3, amd 9.0.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 139077. Vendors have confirmed this vulnerability IBM X-Force ID: 139077 It is released as.Information may be obtained and information may be altered. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks
VAR-201803-1737 CVE-2018-1141 Nessus Vulnerabilities related to authorization, permissions, and access control CVSS V2: 4.4
CVSS V3: 7.0
Severity: HIGH
When installing Nessus to a directory outside of the default location, Nessus versions prior to 7.0.3 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the installation location. Nessus Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TenableNetworkSecurityNessus is an open source vulnerability scanner with strong scalability from TenableNetworkSecurity. A security vulnerability exists in TenableNetworkSecurityNessus. A local attacker could exploit this vulnerability to increase privileges
VAR-201803-1365 CVE-2017-8176 Huawei IPTV STB Access control vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Huawei IPTV STB with earlier than IPTV STB V100R003C01LMYTa6SPC001 versions has an authentication bypass vulnerability. An attacker could exploit this vulnerability to access the serial interface and modify the configuration. Successful exploit could lead to the authentication bypass and view channels by free. HuaweiIPTVSTB is a network set-top box product of China's Huawei company. An authentication bypass vulnerability exists in the HuaweiIPTVSTBV100R003C01LMYTa6SPC001 version
VAR-201803-2162 CVE-2018-5717 NCR S2 Dispenser Vulnerable to out-of-bounds writing CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Memory write mechanism in NCR S2 Dispenser controller before firmware version 0x0108 allows an unauthenticated user to upgrade or downgrade the firmware of the device, including to older versions with known vulnerabilities. NCR S2 Dispenser Contains an out-of-bounds vulnerability.Information may be tampered with. NCRS2Dispensercontroller is a distributor control board product of NCR Corporation of the United States. An attacker could exploit this vulnerability to upgrade or downgrade device firmware
VAR-201803-1338 CVE-2017-17668 NCR S1 Dispenser Vulnerabilities related to access control in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Memory write mechanism in NCR S1 Dispenser controller before firmware version 0x0156 allows an unauthenticated user to upgrade or downgrade the firmware of the device, including to older versions with known vulnerabilities. NCR S1 Dispenser There is an access control vulnerability in the firmware.Information may be tampered with. CRS1Dispensercontroller is a distributor control board product of NCR Corporation of the United States. An attacker could exploit this vulnerability to upgrade or downgrade device firmware
VAR-201803-0148 CVE-2017-1602 IBM RSA DM Access control vulnerability CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
IBM RSA DM (IBM Rational Collaborative Lifecycle Management 5.0 and 6.0) could allow an authenticated user to access settings that they should not be able to using a specially crafted URL. IBM X-Force ID: 132625. Vendors have confirmed this vulnerability IBM X-Force ID: 132625 It is released as.Information may be tampered with. Multiple IBM Products are prone to the following multiple security vulnerabilities: 1. An information-disclosure vulnerability 2. Multiple cross-site scripting vulnerability 3. An access-bypass vulnerability An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, gain unauthorized access to the affected application or to obtain sensitive information
VAR-201803-0128 CVE-2017-1655 IBM Jazz Foundation Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
IBM Jazz Foundation (IBM Rational Collaborative Lifecycle Management 5.0 and 6.0) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 133379. Vendors have confirmed this vulnerability IBM X-Force ID: 133379 It is released as.Information may be obtained and information may be altered. Multiple IBM Products are prone to the following multiple security vulnerabilities: 1. An information-disclosure vulnerability 2. Multiple cross-site scripting vulnerability 3. An access-bypass vulnerability An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, gain unauthorized access to the affected application or to obtain sensitive information
VAR-201803-1094 CVE-2017-1629 IBM Jazz Foundation Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
IBM Jazz Foundation (IBM Rational Collaborative Lifecycle Management 5.0 and 6.0) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 133127. Vendors have confirmed this vulnerability IBM X-Force ID: 133127 It is released as.Information may be obtained and information may be altered. Multiple IBM Products are prone to the following multiple security vulnerabilities: 1. An information-disclosure vulnerability 2. Multiple cross-site scripting vulnerability 3. An access-bypass vulnerability An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, gain unauthorized access to the affected application or to obtain sensitive information
VAR-201803-1350 CVE-2017-1762 IBM Jazz Foundation Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
IBM Jazz Foundation (IBM Rational Collaborative Lifecycle Management 5.0 and 6.0) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 136006. Vendors have confirmed this vulnerability IBM X-Force ID: 136006 It is released as.Information may be obtained and information may be altered. Multiple IBM Products are prone to the following multiple security vulnerabilities: 1. An information-disclosure vulnerability 2. Multiple cross-site scripting vulnerability 3. An access-bypass vulnerability An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, gain unauthorized access to the affected application or to obtain sensitive information