VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201803-1812 CVE-2018-5500 plural F5 BIG-IP Product depletion vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
On F5 BIG-IP systems running 13.0.0, 12.1.0 - 12.1.3.1, or 11.6.1 - 11.6.2, every Multipath TCP (MCTCP) connection established leaks a small amount of memory. Virtual server using TCP profile with Multipath TCP (MCTCP) feature enabled will be affected by this issue. plural F5 BIG-IP The product is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. F5BIG-IP is an all-in-one network device that integrates network traffic management, application security management, load balancing and other functions. There is a security hole in F5BIG-IP. An attacker could exploit the vulnerability to cause a denial of service (out of memory). Multiple F5 BIG-IP Products is prone to a memory-corruption vulnerability. Attackers can exploit this issue to obtain sensitive information or crash the application resulting in a denial-of-service condition. A security vulnerability exists in F5 BIG-IP version 13.0.0, versions 12.1.0 through 12.1.3.1, and versions 11.6.1 through 11.6.2
VAR-201803-2083 CVE-2018-5455 Moxa OnCell G3100-HSPA Series Authentication Bypass Vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A Reliance on Cookies without Validation and Integrity Checking issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. The application allows a cookie parameter to consist of only digits, allowing an attacker to perform a brute force attack bypassing authentication and gaining access to device functions. Moxa OnCell G3100-HSPA There are authentication vulnerabilities in the series.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MoxaOnCellG3100-HSPA is an intelligent, feature-rich wireless communication platform that connects network devices and serial devices to cellular TCP/IP networks. Moxa OnCell G3100-HSPA Series is prone to multiple denial-of-service vulnerabilities and an authentication-bypass vulnerability. OnCell G3100-HSPA Series 1.4 Build 16062919 and prior are vulnerable. Moxa OnCell G3100-HSPA Series is the G3100 series gateway product of Moxa
VAR-201803-2081 CVE-2018-5453 Moxa OnCell G3100-HSPA Series Denial of service vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
An Improper Handling of Length Parameter Inconsistency issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker may be able to edit the element of an HTTP request, causing the device to become unavailable. Moxa OnCell G3100-HSPA The series contains a data processing vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. MoxaOnCellG3100-HSPA is an intelligent, feature-rich wireless communication platform that connects network devices and serial devices to cellular TCP/IP networks. Moxa OnCell G3100-HSPA Series is prone to multiple denial-of-service vulnerabilities and an authentication-bypass vulnerability. An attacker can exploit these issues to bypass authentication mechanism or to cause a denial-of-service condition; denying service to legitimate users. OnCell G3100-HSPA Series 1.4 Build 16062919 and prior are vulnerable. Moxa OnCell G3100-HSPA Series is the G3100 series gateway product of Moxa
VAR-201803-2078 CVE-2018-5449 Moxa OnCell G3100-HSPA Series Null Pointer Reference Denial of Service Vulnerability CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
A NULL Pointer Dereference issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. The application does not check for a NULL value, allowing for an attacker to perform a denial of service attack. MoxaOnCellG3100-HSPA is an intelligent, feature-rich wireless communication platform that connects network devices and serial devices to cellular TCP/IP networks. Moxa OnCell G3100-HSPA Series is prone to multiple denial-of-service vulnerabilities and an authentication-bypass vulnerability. An attacker can exploit these issues to bypass authentication mechanism or to cause a denial-of-service condition; denying service to legitimate users. OnCell G3100-HSPA Series 1.4 Build 16062919 and prior are vulnerable. Moxa OnCell G3100-HSPA Series is the G3100 series gateway product of Moxa
VAR-201803-1813 CVE-2018-5501 plural F5 BIG-IP Product resource exhaustion vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In some circumstances, on F5 BIG-IP systems running 13.0.0, 12.1.0 - 12.1.3.1, any 11.6.x or 11.5.x release, or 11.2.1, TCP DNS profile allows excessive buffering due to lack of flow control. plural F5 BIG-IP The product contains a resource exhaustion vulnerability.Denial of service (DoS) May be in a state. F5BIG-IP is an all-in-one network device that integrates network traffic management, application security management, load balancing and other functions. There is a security hole in F5BIG-IP. An attacker could exploit the vulnerability with a TCPDNS profile to cause computer performance degradation or a denial of service. Multiple F5 BIG-IP Products is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to crash the application resulting in denial-of-service conditions. A security vulnerability exists in the F5 BIG-IP
VAR-201803-1076 CVE-2017-6154 BIG-IP ASM Input validation vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
On F5 BIG-IP systems running 13.0.0, 12.1.0 - 12.1.3.1, or 11.6.1 - 11.6.2, the BIG-IP ASM bd daemon may core dump memory under some circumstances when processing undisclosed types of data on systems with 48 or more CPU cores. BIG-IP ASM Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5BIG-IPASM (ApplicationSecurityManager) is a Web Application Firewall (WAF) from F5 Corporation of the United States that provides secure remote access, secure email protection, and simplified Web access control while enhancing network and application performance. There is a security hole in F5BIG-IPASM. An attacker could exploit this vulnerability to interrupt traffic processing and perform failover. F5 BIG-IP ASM is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to crash the application resulting in denial-of-service conditions
VAR-201803-2348 No CVE Denial of Service Vulnerability in Zhejiang Dahua Play Library SDK CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products. There is a denial of service vulnerability in dhplay.dll in the Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version. An attacker can use this vulnerability to cause denial of service access.
VAR-201803-2349 No CVE Directory traversal vulnerability exists along wireless network routing CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shun network wireless routing is a management tool used to prevent idlers from getting online when WiFi sharing. A directory traversal vulnerability exists in the wireless routing along the network. An attacker can use this vulnerability to perform unauthorized operations on the wireless routing along the network.
VAR-201803-2360 No CVE Cross-Border Access Vulnerability in Zhejiang Dahua Play Library SDK CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products. The mpeg4dec.dll in the Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has an out-of-bounds access vulnerability. An attacker can use this vulnerability to cause a denial of service or information leakage.
VAR-201803-1845 CVE-2018-7238 Schneider Electric Pelco Sarix Professional Buffer error vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A buffer overflow vulnerability exist in the web-based GUI of Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow an unauthenticated, remote attacker to execute arbitrary code. Schneider Electric Pelco Sarix Professional Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SchneiderElectricPelcoSarixProfessional is a video surveillance device from Schneider Electric, France
VAR-201803-1844 CVE-2018-7237 Schneider Electric Pelco Sarix Professional Input validation vulnerability CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow a remote attacker to delete arbitrary system file due to lack of validation of the /login/bin/set_param to the file name with the value of 'system.delete.sd_file'. Schneider Electric Pelco Sarix Professional Contains an input validation vulnerability.Information may be tampered with. SchneiderElectricPelcoSarixProfessional is a video surveillance device from Schneider Electric, France. A security vulnerability exists in SchneiderElectricPelcoSarixProfessional with firmware prior to 3.29.67. The vulnerability stems from the failure of the /login/bin/set_param program to check the file name when processing the system.delete.sd_file parameter. A remote attacker could exploit this vulnerability to remove any system files
VAR-201803-1841 CVE-2018-7234 Schneider Electric Pelco Sarix Professional Vulnerabilities related to certificate validation CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow arbitrary system file download due to lack of validation of SSL certificate. Schneider Electric Pelco Sarix Professional Contains a certificate validation vulnerability.Information may be obtained. SchneiderElectricPelcoSarixProfessional is a video surveillance device from Schneider Electric, France. An attacker could exploit this vulnerability to download any system files
VAR-201803-1842 CVE-2018-7235 Schneider Electric Pelco Sarix Professional Input validation vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow arbitrary system file download due to lack of validation of the shell meta characters with the value of 'system.download.sd_file'. Schneider Electric Pelco Sarix Professional Contains an input validation vulnerability.Information may be obtained. SchneiderElectricPelcoSarixProfessional is a video surveillance device from Schneider Electric, France. An attacker could exploit this vulnerability to download arbitrary files
VAR-201803-1042 CVE-2017-17227 Huawei Mate Smartphone vulnerabilities related to out-of-bounds reading CVSS V2: 9.3
CVSS V3: 7.8
Severity: HIGH
GPU driver in Huawei Mate 10 smart phones with the versions before ALP-L09 8.0.0.120(C212); The versions before ALP-L09 8.0.0.127(C900); The versions before ALP-L09 8.0.0.128(402/C02/C109/C346/C432/C652) has a out-of-bounds memory access vulnerability due to the input parameters validation. An attacker tricks a user into installing a malicious application on the smart phone, and the application can call the driver with special parameter and cause accessing out-of-bounds memory. Successful exploit may result in phone crash or arbitrary code execution. Huawei Mate Smartphone contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. HuaweiMate10 is a smartphone from China's Huawei company
VAR-201803-1074 CVE-2017-6150 plural F5 BIG-IP Vulnerability related to input validation in products CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Under certain conditions for F5 BIG-IP systems 13.0.0 or 12.1.0 - 12.1.3.1, using FastL4 profiles, when the Reassemble IP Fragments option is disabled (default), some specific large fragmented packets may restart the Traffic Management Microkernel (TMM). plural F5 BIG-IP The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5BIG-IP is an all-in-one network device that integrates network traffic management, application security management, load balancing and other functions. There is a security hole in F5BIG-IP. An attacker could exploit this vulnerability to cause the TrafficManagementMicrokernel to restart. Multiple F5 BIG-IP Products are prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to crash the application resulting in denial-of-service conditions. A security vulnerability exists in F5 BIG-IP version 13.0.0 and versions 12.1.0 through 12.1.3.1
VAR-201803-2233 CVE-2018-7561 Tenda AC9 Device buffer error vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Stack-based Buffer Overflow in httpd on Tenda AC9 devices V15.03.05.14_EN allows remote attackers to cause a denial of service or possibly have unspecified other impact. Tenda AC9 The device contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TendaAC9 is a wireless router product from Tenda. A stack buffer overflow vulnerability exists in httpd in TendaAC9. A remote attacker could exploit the vulnerability to cause a denial of service
VAR-201803-1796 CVE-2018-6231 Trend Micro Smart Protection Server Command injection vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A server auth command injection authentication bypass vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.3 and below could allow remote attackers to escalate privileges on vulnerable installations. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of credentials provided at login. When parsing the username, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. A security vulnerability exists in Trend MicroSmartProtectionServer (Standalone) 3.3 and earlier. Successfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial-of-service condition
VAR-201803-2076 CVE-2018-5314 plural Citrix Command injection vulnerability in the product CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Command injection vulnerability in Citrix NetScaler ADC and NetScaler Gateway 11.0 before build 70.16, 11.1 before build 55.13, and 12.0 before build 53.13; and the NetScaler Load Balancing instance distributed with NetScaler SD-WAN/CloudBridge 4000, 4100, 5000 and 5100 WAN Optimization Edition 9.3.0 allows remote attackers to execute a system command or read arbitrary files via an SSH login prompt. plural Citrix The product contains a command injection vulnerability.Information may be obtained. Citrix NetScaler ADC and NetScaler Gateway are prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism. This may aid in further attacks. The following products are affected: Citrix NetScaler ADC and NetScaler Gateway version 12.0 builds 41.16, 41.22, 41.24, 51.24 and 53.6 Citrix NetScaler ADC and NetScaler Gateway version 11.1 builds 51.21, 51.26, 52.13, 53.11, 54.14, 54.16 and 55.10 Citrix NetScaler ADC and NetScaler Gateway version 11.0 build 70.12. Citrix NetScaler Application Delivery Controller, etc. are all products of Citrix Systems (Citrix Systems). NetScaler ADC is a service and application delivery solution (application delivery controller); NetScaler Gateway is a secure remote access solution. A command injection vulnerability exists in the management interface and NetScaler Load Balancing instances in several Citrix products. The following products are affected: NetScaler ADC 11.0 prior to 70.16, 11.1 prior to 55.13, 12.0 prior to 53.13; NetScaler Gateway 11.0 prior to 70.16, 11.1 prior to 55.13, 12.0 prior to 53.13 (management interface); SD-WAN/CloudBridge 4000 WAN Optimization Edition version 9.3.0; 4100 WAN Optimization Edition version 9.3.0; 5000 WAN Optimization Edition version 9.3.0; 5100 WAN Optimization Edition version 9.3.0 (NetScaler Load Balancing instance)
VAR-201803-0166 CVE-2017-17281 plural Huawei Product out-of-bounds vulnerability CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
SFTP module in Huawei DP300 V500R002C00; RP200 V600R006C00; TE30 V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00 has an out-of-bounds read vulnerability. A remote, authenticated attacker could exploit this vulnerability by sending specially crafted messages to a target device. Successful exploit may cause some information leak. plural Huawei The product contains an out-of-bounds vulnerability.Information may be obtained. The Huawei DP300, RP200, and TE series are integrated desktop telepresence and integrated video conferencing terminal products of China Huawei. The Huawei DP300 and others are all products of China's Huawei (Huawei). DP300 is a video conferencing terminal. RP200 is a video conferencing all-in-one device. SFTP moudle is one of the encrypted transmission modules. The following products and versions are affected: Huawei DP300 V500R002C00 Version; RP200 V600R006C00 Version; TE30 V100R001C10 Version, V500R002C00 Version, V600R006C00 Version; TE40 V500R002C00 Version, V600R006C00 Version; TE50 V500R002C00 Version, V600R006C00 Version; TE60 V100R001C10 Version, V500R002C00 Version, V600R006C00 Version
VAR-201803-0167 CVE-2017-17282 plural Huawei Product buffer error vulnerability CVSS V2: 2.9
CVSS V3: 3.1
Severity: LOW
SCCP (Signalling Connection Control Part) module in Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 has a buffer overflow vulnerability. An attacker has to find a way to send malformed packets to the affected products repeatedly. Due to insufficient input validation, successful exploit may cause some service abnormal. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Huawei DP300, RP200, and TE series are integrated desktop telepresence and integrated video conferencing terminal products of China Huawei. The Huawei DP300 and others are all products of China's Huawei (Huawei). DP300 is a video conferencing terminal. RP200 is a video conferencing all-in-one device. The following products and versions are affected: Huawei DP300 V500R002C00 Version; RP200 V500R002C00 Version, V600R006C00 Version; TE30 V100R001C10 Version, V500R002C00 Version, V600R006C00 Version; TE40 V500R002C00 Version, V600R006C00 Version; TE50 V500R002C00 Version, V600R006C00 Version; TE60 V100R001C10 Version, V500R002C00 Version, Version V600R006C00