VARIoT IoT vulnerabilities database

VAR-201711-0300 | CVE-2017-12261 | Cisco Identity Services Engine Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in the restricted shell of the Cisco Identity Services Engine (ISE) that is accessible via SSH could allow an authenticated, local attacker to run arbitrary CLI commands with elevated privileges. The vulnerability is due to incomplete input validation of the user input for CLI commands issued at the restricted shell. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. An attacker would need valid user credentials to the device to exploit this vulnerability. The vulnerability affects the following Cisco Identity Services Engine (ISE) products running Release 1.4, 2.0, 2.0.1, 2.1.0: ISE, ISE Express, ISE Virtual Appliance. Cisco Bug IDs: CSCve74916. Vendors have confirmed this vulnerability Bug ID CSCve74916 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies. Active Directory integration is one of the active directory components
VAR-201711-0301 | CVE-2017-12262 | Cisco Application Policy Infrastructure Controller Enterprise Vulnerabilities related to authorization, authority, and access control in modules |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
A vulnerability within the firewall configuration of the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) could allow an unauthenticated, adjacent attacker to gain privileged access to services only available on the internal network of the device. The vulnerability is due to an incorrect firewall rule on the device. The misconfiguration could allow traffic sent to the public interface of the device to be forwarded to the internal virtual network of the APIC-EM. An attacker that is logically adjacent to the network on which the public interface of the affected APIC-EM resides could leverage this behavior to gain access to services listening on the internal network with elevated privileges. This vulnerability affects appliances or virtual devices running Cisco Application Policy Infrastructure Controller Enterprise Module prior to version 1.5. Cisco Bug IDs: CSCve89638. Vendors have confirmed this vulnerability Bug ID CSCve89638 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state.
An attacker can exploit this issue to bypass the security mechanism and gain unauthorized access. This may lead to further attacks
VAR-201711-0302 | CVE-2017-12273 | plural Cisco Aironet Access point input vulnerability |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in 802.11 association request frame processing for the Cisco Aironet 1560, 2800, and 3800 Series Access Points could allow an unauthenticated, Layer 2 radio frequency (RF) adjacent attacker to cause the Access Point (AP) to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient frame validation of the 802.11 association request. An attacker could exploit this vulnerability by sending a malformed 802.11 association request to the targeted device. An exploit could allow the attacker to cause the AP to reload, resulting in a DoS condition while the AP is reloading. This vulnerability affects the following Cisco products running either the Lightweight AP Software or Mobility Express image: Aironet 1560 Series Access Points, Aironet 2800 Series Access Points, Aironet 3800 Series Access Points. Note: The Cisco Aironet 1560 Series Access Point device is supported as of release 8.3.112.0. Cisco Bug IDs: CSCve12189. Vendors have confirmed this vulnerability Bug ID CSCve12189 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state
VAR-201711-0303 | CVE-2017-12274 | plural Cisco Aironet Access point input vulnerability |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in Extensible Authentication Protocol (EAP) ingress frame processing for the Cisco Aironet 1560, 2800, and 3800 Series Access Points could allow an unauthenticated, Layer 2 radio frequency (RF) adjacent attacker to cause the Access Point (AP) to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of the EAP frame. An attacker could exploit this vulnerability by sending a malformed EAP frame to the targeted device. A successful exploit could allow the attacker to cause the AP to reload, resulting in a DoS condition while the AP is reloading. It may be necessary to manually power cycle the device in order for it to recover. This vulnerability affects the following Cisco products running either the Lightweight AP Software or Mobility Express image: Aironet 1560 Series Access Points, Aironet 2800 Series Access Points, Aironet 3800 Series Access Points. Note: The Cisco Aironet 1560 Series Access Point device is supported as of release 8.3.112.0. Cisco Bug IDs: CSCve18935. Vendors have confirmed this vulnerability Bug ID CSCve18935 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. The ExtensibleAuthenticationProtocol (EAP) ingressfram in the Cisco Aironet 1560, 2800, and 3800 Series AccessPoints handles a denial of service vulnerability that stems from a program failing to adequately validate EAP frames
VAR-201711-0304 | CVE-2017-12275 | Cisco Wireless LAN Controller Input validation vulnerability |
CVSS V2: 6.1 CVSS V3: 7.4 Severity: HIGH |
A vulnerability in the implementation of 802.11v Basic Service Set (BSS) Transition Management functionality in Cisco Wireless LAN Controllers could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of 802.11v BSS Transition Management Response packets that an affected device receives from wireless clients. An attacker could exploit this vulnerability by sending a malformed 802.11v BSS Transition Management Response packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload unexpectedly, resulting in a DoS condition. Cisco Bug IDs: CSCvb57803. Cisco Wireless LAN Controller Contains an input validation vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvb57803 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. This product provides functions such as security policy and intrusion detection in wireless LAN
VAR-201711-0305 | CVE-2017-12276 | Cisco Prime Collaboration Provisioning Application input validation vulnerability |
CVSS V2: 5.5 CVSS V3: 8.1 Severity: HIGH |
A vulnerability in the web framework code for the SQL database interface of the Cisco Prime Collaboration Provisioning application could allow an authenticated, remote attacker to impact the confidentiality and integrity of the application by executing arbitrary SQL queries, aka SQL Injection. The attacker could read or write information from the SQL database. The vulnerability is due to a lack of proper validation on user-supplied input within SQL queries. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious SQL statements to the affected application. An exploit could allow the attacker to determine the presence of certain values and write malicious input in the SQL database. The attacker would need to have valid user credentials. This vulnerability affects Cisco Prime Collaboration Provisioning Software Releases prior to 12.3. Cisco Bug IDs: CSCvf47935. Vendors have confirmed this vulnerability Bug ID CSCvf47935 It is released as.Information may be obtained and information may be altered. The software provides IP communications services functionality for IP telephony, voice mail, and unified communications environments
VAR-201711-0307 | CVE-2017-12278 | Cisco Wireless LAN Controller Resource management vulnerability |
CVSS V2: 5.2 CVSS V3: 6.3 Severity: MEDIUM |
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco Wireless LAN Controllers could allow an authenticated, remote attacker to cause an affected device to restart, resulting in a denial of service (DoS) condition. The vulnerability is due to a memory leak that occurs on an affected device after the device fails to deallocate a buffer that is used when certain MIBs are polled. An attacker who knows the SNMP Version 2 SNMP Read string or has valid SNMP Version 3 credentials for an affected device could repeatedly poll the affected MIB object IDs (OIDs) and consume available memory on the device. When memory is sufficiently depleted on the device, the device will restart, resulting in a DoS condition. Cisco Bug IDs: CSCvc71674. Cisco Wireless LAN Controller Contains a resource management vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvc71674 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. The product provides security policy, intrusion detection and other functions in the wireless LAN. SimpleNetworkManagementProtocol (SNMP) is one of the simple network management subsystems for network device management information exchange. A denial of service vulnerability exists in the Cisco WirelessLANControllerSimpleNetworkManagementProtocol subsystem
VAR-201711-0308 | CVE-2017-12279 | Cisco Aironet For access point Cisco IOS Information disclosure vulnerability in software |
CVSS V2: 3.3 CVSS V3: 4.3 Severity: MEDIUM |
A vulnerability in the packet processing code of Cisco IOS Software for Cisco Aironet Access Points could allow an unauthenticated, adjacent attacker to retrieve content from memory on an affected device, which could lead to the disclosure of confidential information. The vulnerability is due to insufficient condition checks that are performed by the affected device when the device adds padding to egress packets. An attacker could exploit this vulnerability by sending a crafted IP packet to an affected device. A successful exploit could allow the attacker to retrieve content from memory on the affected device, which could lead to the disclosure of confidential information. Cisco Bug IDs: CSCvc21581. Vendors have confirmed this vulnerability Bug ID CSCvc21581 It is released as.Information may be obtained.
An attacker can exploit this issue to obtain sensitive information that may aid in further attacks. IOS Software is one of the dedicated operating systems for network devices
VAR-201711-0309 | CVE-2017-12280 | Cisco Wireless LAN Controller Buffer error vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) Discovery Request parsing functionality of Cisco Wireless LAN Controllers could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation of fields in CAPWAP Discovery Request packets by the affected device. An attacker could exploit this vulnerability by sending crafted CAPWAP Discovery Request packets to an affected device. A successful exploit could allow the attacker to cause the affected device to restart unexpectedly, resulting in a DoS condition. Cisco Bug IDs: CSCvb95842. Cisco Wireless LAN Controller Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvb95842 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. The product provides security policy, intrusion detection and other functions in the wireless LAN. A Denial of Service vulnerability exists in ControlandProvisioning of the WirelessAccessPoints (CAPWAP) DiscoveryRequest parsing feature in the WLC.
Attackers can exploit this issue to cause denial-of-service conditions
VAR-201711-0310 | CVE-2017-12281 | plural Cisco Aironet Access point authentication vulnerabilities |
CVSS V2: 5.4 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the implementation of Protected Extensible Authentication Protocol (PEAP) functionality for standalone configurations of Cisco Aironet 1800, 2800, and 3800 Series Access Points could allow an unauthenticated, adjacent attacker to bypass authentication and connect to an affected device. The vulnerability exists because the affected device uses an incorrect default configuration setting of fail open when running in standalone mode. An attacker could exploit this vulnerability by attempting to connect to an affected device. A successful exploit could allow the attacker to bypass authentication and connect to the affected device. This vulnerability affects Cisco Aironet 1800, 2800, and 3800 Series Access Points that are running a vulnerable software release and use WLAN configuration settings that include FlexConnect local switching and central authentication with MAC filtering. Cisco Bug IDs: CSCvd46314. Vendors have confirmed this vulnerability Bug ID CSCvd46314 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Cisco Aironet Access Point delivers industry-leading performance for secure, reliable wireless connectivity. Remote users on the local network can exploit the vulnerability to bypass the authentication mechanism and perform unauthorized operations. Cisco Aironet is prone to an authentication-bypass vulnerability. This may lead to further attacks
VAR-201711-0352 | CVE-2017-12282 | Cisco Wireless LAN Controller Buffer error vulnerability |
CVSS V2: 5.7 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the Access Network Query Protocol (ANQP) ingress frame processing functionality of Cisco Wireless LAN Controllers could allow an unauthenticated, Layer 2 RF-adjacent attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation of ANQP query frames by the affected device. An attacker could exploit this vulnerability by sending a malformed ANQP query frame to an affected device that is on an RF-adjacent network. A successful exploit could allow the attacker to cause the affected device to restart unexpectedly, resulting in a DoS condition. This vulnerability affects Cisco Wireless LAN Controllers that are running a vulnerable release of Cisco WLC Software and are configured to support Hotspot 2.0. Cisco Bug IDs: CSCve05779. Vendors have confirmed this vulnerability Bug ID CSCve05779 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. The product provides security policy, intrusion detection and other functions in the wireless LAN. A Denial of Service vulnerability exists in the AccessNetworkQueryProtocol(ANQP)ingressframe processing function in CiscoWLC
VAR-201711-0353 | CVE-2017-12283 | Cisco Aironet 3800 Series access point buffer error vulnerability |
CVSS V2: 2.9 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the handling of 802.11w Protected Management Frames (PAF) by Cisco Aironet 3800 Series Access Points could allow an unauthenticated, adjacent attacker to terminate a valid user connection to an affected device, aka Denial of Service. The vulnerability exists because the affected device does not properly validate 802.11w PAF disassociation and deauthentication frames that it receives. An attacker could exploit this vulnerability by sending a spoofed 802.11w PAF frame from a valid, authenticated client on an adjacent network to an affected device. A successful exploit could allow the attacker to terminate a single valid user connection to the affected device. This vulnerability affects Access Points that are configured to run in FlexConnect mode. Cisco Bug IDs: CSCvc20627. Vendors have confirmed this vulnerability Bug ID CSCvc20627 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. 802.11wProtectedManagementFrames (PAF) is one of the frame encryption protection components.
Attackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users
VAR-201711-0358 | CVE-2017-12294 | Cisco WebEx Meetings Server Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability in Cisco WebEx Meetings Server could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf85562. Vendors have confirmed this vulnerability Bug ID CSCvf85562 It is released as.Information may be obtained and information may be altered. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. Cisco WebEx Meetings Server (CWMS) is a set of multi-functional conference solutions including audio, video and Web conference in Cisco's WebEx conference solution
VAR-201711-0359 | CVE-2017-12295 | Cisco WebEx Meetings Server Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in Cisco WebEx Meetings Server could allow an unauthenticated, remote attacker to access sensitive data about the application. An attacker could exploit this vulnerability to gain information to conduct additional reconnaissance attacks. The vulnerability is due to the HTTP header reply from the Cisco WebEx Meetings Server to the client, which could include internal network information that should be restricted. An attacker could exploit the vulnerability by attempting to use the HTTP protocol and looking at the data in the HTTP responses from the Cisco WebEx Meetings Server. An exploit could allow the attacker to discover sensitive data about the application. Cisco Bug IDs: CSCve65818. Vendors have confirmed this vulnerability Bug ID CSCve65818 It is released as.Information may be obtained. Cisco WebEx Meetings Server (CWMS) is a set of multi-functional conference solutions including audio, video and Web conference in Cisco's WebEx conference solution
VAR-201808-0145 | CVE-2017-16252 | Insteon Hub 2245-222 Buffer error vulnerability |
CVSS V2: 5.5 CVSS V3: 8.1 Severity: HIGH |
Specially crafted commands sent through the PubNub service in Insteon Hub 2245-222 with firmware version 1012 can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability.At 0x9d014cc0 the value for the cmd key is copied using strcpy to the buffer at $sp+0x11c. This buffer is 20 bytes large, sending anything longer will cause a buffer overflow. Insteon Hub 2245-222 Contains a buffer error vulnerability.Information may be tampered with. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
VAR-201903-0906 | CVE-2017-16253 | Insteon Hub Firmware buffer error vulnerability |
CVSS V2: 5.5 CVSS V3: 8.1 Severity: HIGH |
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012 for the cc channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request At 0x9d014dd8 the value for the id key is copied using strcpy to the buffer at $sp+0x290. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. An attacker could exploit the vulnerability to cover any data by sending an authenticated request
VAR-201903-0907 | CVE-2017-16254 | Insteon Hub Firmware buffer error vulnerability |
CVSS V2: 5.5 CVSS V3: 8.1 Severity: HIGH |
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request at 0x9d014e4c the value for the flg key is copied using strcpy to the buffer at $sp+0x270. This buffer is 16 bytes large, sending anything longer will cause a buffer overflow. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. An attacker could exploit the vulnerability to cover any data by sending an authenticated request
VAR-201903-0908 | CVE-2017-16255 | Insteon Hub Firmware buffer error vulnerability |
CVSS V2: 5.5 CVSS V3: 8.1 Severity: HIGH |
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request at At 0x9d014e84 the value for the cmd1 key is copied using strcpy to the buffer at $sp+0x280. This buffer is 16 bytes large. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home
VAR-201712-0705 | CVE-2017-16241 | AMAG Symmetry Door Edge Network Controller Access control vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Incorrect access control in AMAG Symmetry Door Edge Network Controllers (EN-1DBC Boot App 23611 03.60 and STD App 23603 03.60; EN-2DBC Boot App 24451 01.00 and STD App 2461 01.00) enables remote attackers to execute door controller commands (e.g., lock, unlock, add ID card value) by sending unauthenticated requests to the affected devices via Serial over TCP/IP, as demonstrated by a Ud command. AMAG Symmetry Door Edge Network Controller Contains an access control vulnerability.Information may be tampered with. of the United States. A security vulnerability exists in AMAGSymmetryDoorEdgeNetworkControllers that stems from incorrect access control
VAR-201803-1090 | CVE-2017-16242 | MECO USB Memory Stick with Fingerprint Vulnerabilities related to authorization, authority, and access control in devices |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
An issue was discovered on MECO USB Memory Stick with Fingerprint MECOZiolsamDE601 devices. The fingerprint authentication requirement for data access can be bypassed. An attacker with physical access can send a static packet to a serial port exposed on the PCB to unlock the key and get access to the data without possessing the required fingerprint. MECO USB Memory Stick with Fingerprint Devices have vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The MECOUSBMemoryStick is a portable USB storage device. A security hole exists in the MECOUSBMemoryStick with FingerprintMECOZiolsamDE601