VARIoT IoT vulnerabilities database

VAR-201804-0521 | CVE-2017-12716 | Abbott Laboratories pacemakers Vulnerable to information disclosure |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
Abbott Laboratories Accent and Anthem pacemakers manufactured prior to Aug 28, 2017 transmit unencrypted patient information via RF communications to programmers and home monitoring units. Additionally, the Accent and Anthem pacemakers store the optional patient information without encryption. CVSS v3 base score: 3.1, CVSS vector string: AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N. Abbott has developed a firmware update to help mitigate the identified vulnerabilities. Abbott Laboratories pacemakers Contains an information disclosure vulnerability.Information may be obtained. Accent, Anthem, Accent MRI, Assurity, Allure, and Assurity MRI are all implantable medical devices from Abbott Laboratories. Multiple Abbott Pacemakers are prone to the following multiple security vulnerabilities:
1. An authentication-bypass vulnerability
2. An information-disclosure vulnerability
3. A Denial-of-Service vulnerability
Successful exploits may allow an attacker to gain unauthorized access or bypass intended security restrictions, obtain sensitive information or cause denial-of-service conditions
VAR-201804-0520 | CVE-2017-12714 | Abbott Laboratories pacemakers Access control vulnerability |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
Abbott Laboratories pacemakers manufactured prior to Aug 28, 2017 do not restrict or limit the number of correctly formatted "RF wake-up" commands that can be received, which may allow a nearby attacker to repeatedly send commands to reduce pacemaker battery life. CVSS v3 base score: 5.3, CVSS vector string: AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H. Abbott has developed a firmware update to help mitigate the identified vulnerabilities. Abbott Laboratories pacemakers Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Accent, Anthem, Accent MRI, Assurity, Allure, and Assurity MRI are all implantable medical devices from Abbott Laboratories. Battery life. Multiple Abbott Pacemakers are prone to the following multiple security vulnerabilities:
1. An authentication-bypass vulnerability
2. An information-disclosure vulnerability
3. A Denial-of-Service vulnerability
Successful exploits may allow an attacker to gain unauthorized access or bypass intended security restrictions, obtain sensitive information or cause denial-of-service conditions
VAR-201708-1120 | CVE-2017-12706 | Advantech WebAccess Buffer error vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A stack-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer, which could allow an attacker to execute arbitrary code under the context of the process. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:
1. Multiple stack-based buffer-overflow vulnerabilities
2. Multiple heap-based buffer-overflow vulnerabilities.
3. Multiple memory-corruption vulnerabilities.
4. An SQL-injection vulnerability.
5. A format-string vulnerability.
6. An authentication-bypass vulnerability.
7. A security-bypass vulnerability.
8. A privilege-escalation vulnerability.
9. A remote-code execution vulnerability. This may aid in further attacks.
Advantech WebAccess versions prior to V8.2_20170817 are vulnerable. The vulnerability stems from the fact that the program does not fully verify the length of the data submitted by the user
VAR-201708-1125 | CVE-2017-12711 | Advantech WebAccess Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
An Incorrect Privilege Assignment issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A built-in user account has been granted a sensitive privilege that may allow a user to elevate to administrative privileges. Advantech WebAccess Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:
1. Multiple stack-based buffer-overflow vulnerabilities
2. Multiple heap-based buffer-overflow vulnerabilities.
3. Multiple memory-corruption vulnerabilities.
4. An SQL-injection vulnerability.
5. A format-string vulnerability.
6. An authentication-bypass vulnerability.
7. A security-bypass vulnerability.
8. A privilege-escalation vulnerability.
9. A remote-code execution vulnerability.
An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database,perform certain unauthorized actions, gain unauthorized access and gain elevated privileges. This may aid in further attacks.
Advantech WebAccess versions prior to V8.2_20170817 are vulnerable. There is a security vulnerability in Advantech WebAccess 8.2_20170817 and earlier versions, the vulnerability is caused by the program not having the correct assigned permissions
VAR-201708-1119 | CVE-2017-12704 | Advantech WebAccess Buffer error vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
A heap-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to the heap-based buffer, which could allow an attacker to execute arbitrary code under the context of the process. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:
1. Multiple stack-based buffer-overflow vulnerabilities
2. Multiple heap-based buffer-overflow vulnerabilities.
3. Multiple memory-corruption vulnerabilities.
4. An SQL-injection vulnerability.
5. A format-string vulnerability.
6. An authentication-bypass vulnerability.
7. A security-bypass vulnerability.
8. A privilege-escalation vulnerability.
9. A remote-code execution vulnerability. This may aid in further attacks.
Advantech WebAccess versions prior to V8.2_20170817 are vulnerable. The vulnerability stems from the fact that the program does not fully verify the length of the data submitted by the user
VAR-201708-1117 | CVE-2017-12702 | Advantech WebAccess Vulnerabilities related to format strings |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
An Externally Controlled Format String issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. String format specifiers based on user provided input are not properly validated, which could allow an attacker to execute arbitrary code. Advantech WebAccess Contains a format string vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:
1. Multiple stack-based buffer-overflow vulnerabilities
2. Multiple heap-based buffer-overflow vulnerabilities.
3. Multiple memory-corruption vulnerabilities.
4. An SQL-injection vulnerability.
5. A format-string vulnerability.
6. An authentication-bypass vulnerability.
7. A security-bypass vulnerability.
8. A privilege-escalation vulnerability.
9. A remote-code execution vulnerability.
An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database,perform certain unauthorized actions, gain unauthorized access and gain elevated privileges. This may aid in further attacks.
Advantech WebAccess versions prior to V8.2_20170817 are vulnerable
VAR-201708-1116 | CVE-2017-12698 | Advantech WebAccess Authentication vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An Improper Authentication issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Specially crafted requests allow a possible authentication bypass that could allow remote code execution. Advantech WebAccess Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:
1. Multiple stack-based buffer-overflow vulnerabilities
2. Multiple heap-based buffer-overflow vulnerabilities.
3. Multiple memory-corruption vulnerabilities.
4. An SQL-injection vulnerability.
5. A format-string vulnerability.
6. An authentication-bypass vulnerability.
7. A security-bypass vulnerability.
8. A privilege-escalation vulnerability.
9. A remote-code execution vulnerability.
An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database,perform certain unauthorized actions, gain unauthorized access and gain elevated privileges. This may aid in further attacks
VAR-201708-1127 | CVE-2017-12717 | Advantech WebAccess Vulnerabilities in uncontrolled search path elements |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
An Uncontrolled Search Path Element issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A maliciously crafted dll file placed earlier in the search path may allow an attacker to execute code within the context of the application. Advantech WebAccess Contains a vulnerability related to uncontrolled search path elements.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:
1. Multiple stack-based buffer-overflow vulnerabilities
2. Multiple heap-based buffer-overflow vulnerabilities.
3. Multiple memory-corruption vulnerabilities.
4. An SQL-injection vulnerability.
5. A format-string vulnerability.
6. An authentication-bypass vulnerability.
7. A security-bypass vulnerability.
8. A privilege-escalation vulnerability.
9. A remote-code execution vulnerability.
An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database,perform certain unauthorized actions, gain unauthorized access and gain elevated privileges. This may aid in further attacks.
Advantech WebAccess versions prior to V8.2_20170817 are vulnerable
VAR-201708-1254 | CVE-2017-13766 | Wireshark Profinet I/O Parser Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In Wireshark 2.4.0 and 2.2.0 to 2.2.8, the Profinet I/O dissector could crash with an out-of-bounds write. This was addressed in plugins/profinet/packet-dcerpc-pn-io.c by adding string validation. Wireshark Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Wireshark is a suite of network packet analysis software developed by the Wireshark team. The Wireshark Profinet I/O parser has a security vulnerability that allows an attacker to exploit a vulnerability to submit a special request for a denial of service attack. Wireshark is prone to a remote denial-of-service vulnerability because it fails to properly handle certain types of packets.
An attacker can leverage this issue to crash the affected application, denying service to legitimate users.
Wireshark 2.4.0 and 2.2.0 through 2.2.8 are vulnerable.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4060-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 09, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : wireshark
CVE ID : CVE-2017-11408 CVE-2017-13766 CVE-2017-17083 CVE-2017-17084
CVE-2017-17085
It was discovered that wireshark, a network protocol analyzer, contained
several vulnerabilities in the dissectors for CIP Safety, IWARP_MPA,
NetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the
execution of arbitrary code.
For the oldstable distribution (jessie), these problems have been fixed
in version 1.12.1+g01b65bf-4+deb8u12.
For the stable distribution (stretch), these problems have been fixed in
version 2.2.6+g32dac6a-2+deb9u1.
We recommend that you upgrade your wireshark packages.
For the detailed security status of wireshark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wireshark
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=JKbF
-----END PGP SIGNATURE-----
VAR-201708-0347 | CVE-2015-3655 | Aruba Networks ClearPass Policy Manager Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Cross-site request forgery (CSRF) vulnerability in Aruba Networks ClearPass Policy Manager before 6.4.7 and 6.5.x before 6.5.2 allows remote attackers to hijack the authentication of administrators by leveraging improper enforcement of the anti-CSRF token. ArubaNetworksClearPassPolicyManager (CPPM) is a BYOD (bring your own device) network access control policy implementation platform from Aruba Networks. A cross-site request forgery vulnerability exists in versions prior to ArubaNetworksCPPM 6.4.7 and in versions 6.5.x prior to 6.5.2. A remote attacker could exploit this vulnerability to perform unauthorized operations. Other attacks are also possible
VAR-201708-1122 | CVE-2017-12708 | Advantech WebAccess Buffer error vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An Improper Restriction Of Operations Within The Bounds Of A Memory Buffer issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities that allow invalid locations to be referenced for the memory buffer, which may allow an attacker to execute arbitrary code or cause the system to crash. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:
1. Multiple stack-based buffer-overflow vulnerabilities
2. Multiple heap-based buffer-overflow vulnerabilities.
3. Multiple memory-corruption vulnerabilities.
4. An SQL-injection vulnerability.
5. A format-string vulnerability.
6. An authentication-bypass vulnerability.
7. A security-bypass vulnerability.
8. A privilege-escalation vulnerability.
9. A remote-code execution vulnerability.
An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database,perform certain unauthorized actions, gain unauthorized access and gain elevated privileges. This may aid in further attacks.
Advantech WebAccess versions prior to V8.2_20170817 are vulnerable
VAR-201709-1054 | CVE-2017-13724 | Axesstel MU553S Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
On the Axesstel MU553S MU55XS-V1.14, there is a Stored Cross Site Scripting vulnerability in the APN parameter under the "Basic Settings" page. Axesstel MU553S Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Axesstel MU553S is a router of Axesstel Company in the United States. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML
VAR-201906-0731 | CVE-2017-13718 | Starry Station Vulnerabilities related to security functions |
CVSS V2: 6.0 CVSS V3: 8.0 Severity: HIGH |
The HTTP API supported by Starry Station (aka Starry Router) allows brute forcing the PIN setup by the user on the device, and this allows an attacker to change the Wi-Fi settings and PIN, as well as port forward and expose any internal device's port to the Internet. It was identified that the device uses custom Python code called "rodman" that allows the mobile appication to interact with the device. The APIs that are a part of this rodman Python file allow the mobile application to interact with the device using a secret, which is a uuid4 based session identifier generated by the device the first time it is set up. However, in some cases, these APIs can also use a security code. This security code is nothing but the PIN number set by the user to interact with the device when using the touch interface on the router. This allows an attacker on the Internet to interact with the router's HTTP interface when a user navigates to the attacker's website, and brute force the credentials. Also, since the device's server sets the Access-Control-Allow-Origin header to "*", an attacker can easily interact with the JSON payload returned by the device and steal sensitive information about the device. Starry Station ( alias Starry Router) Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Starry Station is a wireless router produced by American Starry Company. An authorization issue vulnerability exists in the HTTP API in Starry Station. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products
VAR-201906-0730 | CVE-2017-13717 | Starry Station Vulnerabilities related to certificate and password management |
CVSS V2: 4.3 CVSS V3: 8.8 Severity: HIGH |
Starry Station (aka Starry Router) sets the Access-Control-Allow-Origin header to "*". This allows any hosted file on any domain to make calls to the device's webserver and brute force the credentials and pull any information that is stored on the device. In this case, a user's Wi-Fi credentials are stored in clear text on the device and can be pulled easily. Starry Station ( alias Starry Router) Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
VAR-201708-0153 | CVE-2015-8300 |
Polycom BToE Connector Permissions vulnerability
Related entries in the VARIoT exploits database: VAR-E-201511-0134 |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Polycom BToE Connector before 3.0.0 uses weak permissions (Everyone: Full Control) for "Program Files (x86)\polycom\polycom btoe connector\plcmbtoesrv.exe," which allows local users to gain privileges via a Trojan horse file. Polycom BToE Connector Contains a permission vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. PolycomBToEConnector is a BToE connector developed by Polycom Corporation of the United States. A security vulnerability exists in versions prior to PolycomBToEConnector 3.0.0 that caused the program to assign weak permissions to the (x86)\\polycom\\polycombtoeconnector\\plcmbtoesrv.exe program file. A local attacker can exploit this vulnerability to gain access to a malicious file
VAR-201708-0235 | CVE-2014-8872 | AVM FRITZ!Box 6810 LTE and 6840 LTE Code injection vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Improper Verification of Cryptographic Signature in AVM FRITZ!Box 6810 LTE after firmware 5.22, FRITZ!Box 6840 LTE after firmware 5.23, and other models with firmware 5.50. AVM FRITZ!Box 6810 LTE and 6840 LTE Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AVMFRITZ! Box6810LTE and FRITZ! Box6840 LTE are router products of the German AVM company. A code injection vulnerability exists in AVMFRITZ!Box6810LTE and FRITZ!Box6840LTE due to a program failing to properly verify the cryptographic signature. A remote attacker can exploit this vulnerability to inject and execute malicious code. There is a code injection vulnerability in AVM FRITZ!Box 6810 LTE and FRITZ!Box 6840 LTE
VAR-201708-0479 | CVE-2017-12077 | Synology Router Manager Vulnerable to resource exhaustion |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
Uncontrolled Resource Consumption vulnerability in SYNO.Core.PortForwarding.Rules in Synology Router Manager (SRM) before 1.1.4-6509 allows remote authenticated attacker to exhaust the memory resources of the machine, causing a denial of service attack. Synology Router Manager (SRM) Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Synology Router Manager (SRM) is a Synology software for configuring and managing Synology routers. SYNO.Core.PortForwarding.Rule in versions earlier than SRM 1.1.4-6509 has an uncontrollable resource consumption vulnerability
VAR-201708-1649 | No CVE | Weak Password Vulnerability in DebugShell of ZTE's Multiple OLT PON Devices |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
ZTE OLT C200, C220, C300, C320 are the key PON equipment used in the optical switching network of the telecommunications industry.
Several ZTE OLT PON equipment DebugShell has a weak password vulnerability. Attackers can use the vulnerability to add daily operation account passwords, perform system-level operations, and perform remote control operations on the equipment.
VAR-201708-1569 | No CVE | Rockwell Automation Allen-Bradley Micro850 PLC Has Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Allen-Bradley Micro850 is a programmable logic controller (PLC) from Rockwell Automation, Inc.
The Rockwell Allen-Bradley Micro850 PLC has a Gratuitous ARP denial of service vulnerability. By sending two consecutive ARP requests to the Micro850 PLC, the ARP Sender IP address and ARP Target IP address are both Micro850 PLC IP addresses. An attacker could exploit the vulnerability to cause the Micro850 PLC network. Failure, can not work normally, need to restart the PLC after power off to restore normal
VAR-201708-1638 | No CVE | Schneider Electric Pelco Sarix/Spectra Cameras Remote Code Execution Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
PelcoSarix/SpectraCameras is a camera. A remote code execution vulnerability exists in SchneiderElectricPelcoSarix/SpectraCameras. A remote attacker can exploit the vulnerability to execute arbitrary system commands, authorize the system to access using root privileges, and use specially crafted request and escape sequences to the system shell.