VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201804-0521 CVE-2017-12716 Abbott Laboratories pacemakers Vulnerable to information disclosure CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
Abbott Laboratories Accent and Anthem pacemakers manufactured prior to Aug 28, 2017 transmit unencrypted patient information via RF communications to programmers and home monitoring units. Additionally, the Accent and Anthem pacemakers store the optional patient information without encryption. CVSS v3 base score: 3.1, CVSS vector string: AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N. Abbott has developed a firmware update to help mitigate the identified vulnerabilities. Abbott Laboratories pacemakers Contains an information disclosure vulnerability.Information may be obtained. Accent, Anthem, Accent MRI, Assurity, Allure, and Assurity MRI are all implantable medical devices from Abbott Laboratories. Multiple Abbott Pacemakers are prone to the following multiple security vulnerabilities: 1. An authentication-bypass vulnerability 2. An information-disclosure vulnerability 3. A Denial-of-Service vulnerability Successful exploits may allow an attacker to gain unauthorized access or bypass intended security restrictions, obtain sensitive information or cause denial-of-service conditions
VAR-201804-0520 CVE-2017-12714 Abbott Laboratories pacemakers Access control vulnerability CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
Abbott Laboratories pacemakers manufactured prior to Aug 28, 2017 do not restrict or limit the number of correctly formatted "RF wake-up" commands that can be received, which may allow a nearby attacker to repeatedly send commands to reduce pacemaker battery life. CVSS v3 base score: 5.3, CVSS vector string: AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H. Abbott has developed a firmware update to help mitigate the identified vulnerabilities. Abbott Laboratories pacemakers Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Accent, Anthem, Accent MRI, Assurity, Allure, and Assurity MRI are all implantable medical devices from Abbott Laboratories. Battery life. Multiple Abbott Pacemakers are prone to the following multiple security vulnerabilities: 1. An authentication-bypass vulnerability 2. An information-disclosure vulnerability 3. A Denial-of-Service vulnerability Successful exploits may allow an attacker to gain unauthorized access or bypass intended security restrictions, obtain sensitive information or cause denial-of-service conditions
VAR-201708-1120 CVE-2017-12706 Advantech WebAccess Buffer error vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A stack-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer, which could allow an attacker to execute arbitrary code under the context of the process. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. Multiple heap-based buffer-overflow vulnerabilities. 3. Multiple memory-corruption vulnerabilities. 4. An SQL-injection vulnerability. 5. A format-string vulnerability. 6. An authentication-bypass vulnerability. 7. A security-bypass vulnerability. 8. A privilege-escalation vulnerability. 9. A remote-code execution vulnerability. This may aid in further attacks. Advantech WebAccess versions prior to V8.2_20170817 are vulnerable. The vulnerability stems from the fact that the program does not fully verify the length of the data submitted by the user
VAR-201708-1125 CVE-2017-12711 Advantech WebAccess Vulnerabilities related to authorization, permissions, and access control CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
An Incorrect Privilege Assignment issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A built-in user account has been granted a sensitive privilege that may allow a user to elevate to administrative privileges. Advantech WebAccess Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. Multiple heap-based buffer-overflow vulnerabilities. 3. Multiple memory-corruption vulnerabilities. 4. An SQL-injection vulnerability. 5. A format-string vulnerability. 6. An authentication-bypass vulnerability. 7. A security-bypass vulnerability. 8. A privilege-escalation vulnerability. 9. A remote-code execution vulnerability. An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database,perform certain unauthorized actions, gain unauthorized access and gain elevated privileges. This may aid in further attacks. Advantech WebAccess versions prior to V8.2_20170817 are vulnerable. There is a security vulnerability in Advantech WebAccess 8.2_20170817 and earlier versions, the vulnerability is caused by the program not having the correct assigned permissions
VAR-201708-1119 CVE-2017-12704 Advantech WebAccess Buffer error vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
A heap-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to the heap-based buffer, which could allow an attacker to execute arbitrary code under the context of the process. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. Multiple heap-based buffer-overflow vulnerabilities. 3. Multiple memory-corruption vulnerabilities. 4. An SQL-injection vulnerability. 5. A format-string vulnerability. 6. An authentication-bypass vulnerability. 7. A security-bypass vulnerability. 8. A privilege-escalation vulnerability. 9. A remote-code execution vulnerability. This may aid in further attacks. Advantech WebAccess versions prior to V8.2_20170817 are vulnerable. The vulnerability stems from the fact that the program does not fully verify the length of the data submitted by the user
VAR-201708-1117 CVE-2017-12702 Advantech WebAccess Vulnerabilities related to format strings CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
An Externally Controlled Format String issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. String format specifiers based on user provided input are not properly validated, which could allow an attacker to execute arbitrary code. Advantech WebAccess Contains a format string vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. Multiple heap-based buffer-overflow vulnerabilities. 3. Multiple memory-corruption vulnerabilities. 4. An SQL-injection vulnerability. 5. A format-string vulnerability. 6. An authentication-bypass vulnerability. 7. A security-bypass vulnerability. 8. A privilege-escalation vulnerability. 9. A remote-code execution vulnerability. An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database,perform certain unauthorized actions, gain unauthorized access and gain elevated privileges. This may aid in further attacks. Advantech WebAccess versions prior to V8.2_20170817 are vulnerable
VAR-201708-1116 CVE-2017-12698 Advantech WebAccess Authentication vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An Improper Authentication issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Specially crafted requests allow a possible authentication bypass that could allow remote code execution. Advantech WebAccess Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. Multiple heap-based buffer-overflow vulnerabilities. 3. Multiple memory-corruption vulnerabilities. 4. An SQL-injection vulnerability. 5. A format-string vulnerability. 6. An authentication-bypass vulnerability. 7. A security-bypass vulnerability. 8. A privilege-escalation vulnerability. 9. A remote-code execution vulnerability. An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database,perform certain unauthorized actions, gain unauthorized access and gain elevated privileges. This may aid in further attacks
VAR-201708-1127 CVE-2017-12717 Advantech WebAccess Vulnerabilities in uncontrolled search path elements CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
An Uncontrolled Search Path Element issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A maliciously crafted dll file placed earlier in the search path may allow an attacker to execute code within the context of the application. Advantech WebAccess Contains a vulnerability related to uncontrolled search path elements.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. Multiple heap-based buffer-overflow vulnerabilities. 3. Multiple memory-corruption vulnerabilities. 4. An SQL-injection vulnerability. 5. A format-string vulnerability. 6. An authentication-bypass vulnerability. 7. A security-bypass vulnerability. 8. A privilege-escalation vulnerability. 9. A remote-code execution vulnerability. An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database,perform certain unauthorized actions, gain unauthorized access and gain elevated privileges. This may aid in further attacks. Advantech WebAccess versions prior to V8.2_20170817 are vulnerable
VAR-201708-1254 CVE-2017-13766 Wireshark Profinet I/O Parser Denial of Service Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
In Wireshark 2.4.0 and 2.2.0 to 2.2.8, the Profinet I/O dissector could crash with an out-of-bounds write. This was addressed in plugins/profinet/packet-dcerpc-pn-io.c by adding string validation. Wireshark Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Wireshark is a suite of network packet analysis software developed by the Wireshark team. The Wireshark Profinet I/O parser has a security vulnerability that allows an attacker to exploit a vulnerability to submit a special request for a denial of service attack. Wireshark is prone to a remote denial-of-service vulnerability because it fails to properly handle certain types of packets. An attacker can leverage this issue to crash the affected application, denying service to legitimate users. Wireshark 2.4.0 and 2.2.0 through 2.2.8 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4060-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 09, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : wireshark CVE ID : CVE-2017-11408 CVE-2017-13766 CVE-2017-17083 CVE-2017-17084 CVE-2017-17085 It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for CIP Safety, IWARP_MPA, NetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the execution of arbitrary code. For the oldstable distribution (jessie), these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u12. For the stable distribution (stretch), these problems have been fixed in version 2.2.6+g32dac6a-2+deb9u1. We recommend that you upgrade your wireshark packages. For the detailed security status of wireshark please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wireshark Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlorzcgACgkQEMKTtsN8 Tjbdrg//TwdPY0X/BByo9yCHBaDJiTjq5YtIW5QY3BpPreFH2vlJnF/xCPc2C01y XmIOfRmSn17750SI459dUnovaD8OA51lexYWHbCesTdw/9eXSazssYitckUwOSnz CTx+tp9XqXMrZuDQOdFXqItnZ2nr5K0xTSHVu1lmkJL4C4waItkefEpQHwolKQaH tMdEWd2jM/jjm+dU9Dlo+6pghZdPNXzawzm7273Ca8gwGkGt4SCf/s9ruhJc113c hgQ8NzdASNdvnj28o9dQ0V9ooUxq6SEItSOCMXeq+P+Qfk1RTqT83SOZtEdGmtol yFMenLaVeoNzrrDTSNJuXeGPwJFOFcKY5la5ob3+pae4F+mAmyd7CVMsXVLhiVf8 CS6sGnsyaXugTXQKsfG2l9d5chfMJ/Qj1iAzY0gn2Jt6zOc5sROVvG/ItT6U2vF1 WiUPVULyUdHR1cFdDudA04fQaeY+PzDj0TJ7/iRAT0evK6lp405Yhz0mz6Ro2b3K eQfuF7aLVKYOLEqvjdnEZV1cFAYyySEMPXsxWS9sKyWzImKsOIEBFzTMDglMoZd8 1TMgvr+WCRmpp5XMldIoDNydUkmMdeGQcEtUH4kKWdOs/RRC3218GwtYaJ10WfwX 7rSSoViG1VSG/HPXRY++S8GLSe6aRE0ABfP9stsY2HKheKcXowA= =JKbF -----END PGP SIGNATURE-----
VAR-201708-0347 CVE-2015-3655 Aruba Networks ClearPass Policy Manager Cross-Site Request Forgery Vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
Cross-site request forgery (CSRF) vulnerability in Aruba Networks ClearPass Policy Manager before 6.4.7 and 6.5.x before 6.5.2 allows remote attackers to hijack the authentication of administrators by leveraging improper enforcement of the anti-CSRF token. ArubaNetworksClearPassPolicyManager (CPPM) is a BYOD (bring your own device) network access control policy implementation platform from Aruba Networks. A cross-site request forgery vulnerability exists in versions prior to ArubaNetworksCPPM 6.4.7 and in versions 6.5.x prior to 6.5.2. A remote attacker could exploit this vulnerability to perform unauthorized operations. Other attacks are also possible
VAR-201708-1122 CVE-2017-12708 Advantech WebAccess Buffer error vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An Improper Restriction Of Operations Within The Bounds Of A Memory Buffer issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities that allow invalid locations to be referenced for the memory buffer, which may allow an attacker to execute arbitrary code or cause the system to crash. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. Multiple heap-based buffer-overflow vulnerabilities. 3. Multiple memory-corruption vulnerabilities. 4. An SQL-injection vulnerability. 5. A format-string vulnerability. 6. An authentication-bypass vulnerability. 7. A security-bypass vulnerability. 8. A privilege-escalation vulnerability. 9. A remote-code execution vulnerability. An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database,perform certain unauthorized actions, gain unauthorized access and gain elevated privileges. This may aid in further attacks. Advantech WebAccess versions prior to V8.2_20170817 are vulnerable
VAR-201709-1054 CVE-2017-13724 Axesstel MU553S Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
On the Axesstel MU553S MU55XS-V1.14, there is a Stored Cross Site Scripting vulnerability in the APN parameter under the "Basic Settings" page. Axesstel MU553S Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Axesstel MU553S is a router of Axesstel Company in the United States. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML
VAR-201906-0731 CVE-2017-13718 Starry Station Vulnerabilities related to security functions CVSS V2: 6.0
CVSS V3: 8.0
Severity: HIGH
The HTTP API supported by Starry Station (aka Starry Router) allows brute forcing the PIN setup by the user on the device, and this allows an attacker to change the Wi-Fi settings and PIN, as well as port forward and expose any internal device's port to the Internet. It was identified that the device uses custom Python code called "rodman" that allows the mobile appication to interact with the device. The APIs that are a part of this rodman Python file allow the mobile application to interact with the device using a secret, which is a uuid4 based session identifier generated by the device the first time it is set up. However, in some cases, these APIs can also use a security code. This security code is nothing but the PIN number set by the user to interact with the device when using the touch interface on the router. This allows an attacker on the Internet to interact with the router's HTTP interface when a user navigates to the attacker's website, and brute force the credentials. Also, since the device's server sets the Access-Control-Allow-Origin header to "*", an attacker can easily interact with the JSON payload returned by the device and steal sensitive information about the device. Starry Station ( alias Starry Router) Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Starry Station is a wireless router produced by American Starry Company. An authorization issue vulnerability exists in the HTTP API in Starry Station. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products
VAR-201906-0730 CVE-2017-13717 Starry Station Vulnerabilities related to certificate and password management CVSS V2: 4.3
CVSS V3: 8.8
Severity: HIGH
Starry Station (aka Starry Router) sets the Access-Control-Allow-Origin header to "*". This allows any hosted file on any domain to make calls to the device's webserver and brute force the credentials and pull any information that is stored on the device. In this case, a user's Wi-Fi credentials are stored in clear text on the device and can be pulled easily. Starry Station ( alias Starry Router) Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
VAR-201708-0153 CVE-2015-8300 Polycom BToE Connector Permissions vulnerability

Related entries in the VARIoT exploits database: VAR-E-201511-0134
CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Polycom BToE Connector before 3.0.0 uses weak permissions (Everyone: Full Control) for "Program Files (x86)\polycom\polycom btoe connector\plcmbtoesrv.exe," which allows local users to gain privileges via a Trojan horse file. Polycom BToE Connector Contains a permission vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. PolycomBToEConnector is a BToE connector developed by Polycom Corporation of the United States. A security vulnerability exists in versions prior to PolycomBToEConnector 3.0.0 that caused the program to assign weak permissions to the (x86)\\polycom\\polycombtoeconnector\\plcmbtoesrv.exe program file. A local attacker can exploit this vulnerability to gain access to a malicious file
VAR-201708-0235 CVE-2014-8872 AVM FRITZ!Box 6810 LTE and 6840 LTE Code injection vulnerability CVSS V2: 9.3
CVSS V3: 7.8
Severity: HIGH
Improper Verification of Cryptographic Signature in AVM FRITZ!Box 6810 LTE after firmware 5.22, FRITZ!Box 6840 LTE after firmware 5.23, and other models with firmware 5.50. AVM FRITZ!Box 6810 LTE and 6840 LTE Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AVMFRITZ! Box6810LTE and FRITZ! Box6840 LTE are router products of the German AVM company. A code injection vulnerability exists in AVMFRITZ!Box6810LTE and FRITZ!Box6840LTE due to a program failing to properly verify the cryptographic signature. A remote attacker can exploit this vulnerability to inject and execute malicious code. There is a code injection vulnerability in AVM FRITZ!Box 6810 LTE and FRITZ!Box 6840 LTE
VAR-201708-0479 CVE-2017-12077 Synology Router Manager Vulnerable to resource exhaustion CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
Uncontrolled Resource Consumption vulnerability in SYNO.Core.PortForwarding.Rules in Synology Router Manager (SRM) before 1.1.4-6509 allows remote authenticated attacker to exhaust the memory resources of the machine, causing a denial of service attack. Synology Router Manager (SRM) Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Synology Router Manager (SRM) is a Synology software for configuring and managing Synology routers. SYNO.Core.PortForwarding.Rule in versions earlier than SRM 1.1.4-6509 has an uncontrollable resource consumption vulnerability
VAR-201708-1649 No CVE Weak Password Vulnerability in DebugShell of ZTE's Multiple OLT PON Devices CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
ZTE OLT C200, C220, C300, C320 are the key PON equipment used in the optical switching network of the telecommunications industry. Several ZTE OLT PON equipment DebugShell has a weak password vulnerability. Attackers can use the vulnerability to add daily operation account passwords, perform system-level operations, and perform remote control operations on the equipment.
VAR-201708-1569 No CVE Rockwell Automation Allen-Bradley Micro850 PLC Has Denial of Service Vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Allen-Bradley Micro850 is a programmable logic controller (PLC) from Rockwell Automation, Inc. The Rockwell Allen-Bradley Micro850 PLC has a Gratuitous ARP denial of service vulnerability. By sending two consecutive ARP requests to the Micro850 PLC, the ARP Sender IP address and ARP Target IP address are both Micro850 PLC IP addresses. An attacker could exploit the vulnerability to cause the Micro850 PLC network. Failure, can not work normally, need to restart the PLC after power off to restore normal
VAR-201708-1638 No CVE Schneider Electric Pelco Sarix/Spectra Cameras Remote Code Execution Vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
PelcoSarix/SpectraCameras is a camera. A remote code execution vulnerability exists in SchneiderElectricPelcoSarix/SpectraCameras. A remote attacker can exploit the vulnerability to execute arbitrary system commands, authorize the system to access using root privileges, and use specially crafted request and escape sequences to the system shell.