VARIoT IoT vulnerabilities database

VAR-201711-1026 | CVE-2017-8211 | Huawei smartphone honor 5C and 6x Driver error in buffer error |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
The driver of honor 5C,honor 6x Huawei smart phones with software of versions earlier than NEM-AL10C00B356, versions earlier than Berlin-L21HNC432B360 have a buffer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP which has the root privilege of the Android system, the APP can send a specific parameter to the driver of the smart phone, causing a system reboot or arbitrary code execution. Huawei smartphone honor 5C and 6x Driver contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. bitcoind and Bitcoin-Qt Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be put into a state. Huaweihonor6x and honor5C are both smartphones of China's Huawei company. The vulnerability stems from a program not adequately detecting parameters
VAR-201711-1024 | CVE-2017-8209 | Huawei smartphone honor 5C and 6x Driver error in buffer error |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
The driver of honor 5C,honor 6x Huawei smart phones with software of versions earlier than NEM-AL10C00B356, versions earlier than Berlin-L21HNC432B360 have a buffer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP which has the root privilege of the Android system, the APP can send a specific parameter to the driver of the smart phone, causing a system reboot or arbitrary code execution. Huawei smartphone honor 5C and 6x Driver contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huaweihonor6x and honor5C are both smartphones of China's Huawei company. A buffer overflow vulnerability exists in the driver prior to Huaweihonor6xBerlin-L21HNC432B360 and honor5CNEM-AL10C00B356. The vulnerability stems from a program not adequately detecting parameters
VAR-201708-0531 | CVE-2017-12413 | Axis 2100 Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
AXIS 2100 devices 2.43 have XSS via the URI, possibly related to admin/admin.shtml. AXIS 2100 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. The AXIS2100 is a network camera product from Axis, Sweden. A cross-site scripting vulnerability exists in AXIS21002.43. A remote attacker can exploit this vulnerability to inject arbitrary JavaScript into the application response
VAR-201708-1350 | CVE-2017-6761 | Cisco Finesse Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Finesse 10.6(1) and 11.5(1) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvd96744. Cisco Finesse Contains a cross-site scripting vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvd96744 It is released as.Information may be obtained and information may be altered. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. Cisco Finesse is a set of call center management software developed by Cisco. The software improves call center service quality, improves customer experience, and increases agent satisfaction
VAR-201708-1637 | No CVE | Multiple Cross-Site Request Forgery Vulnerabilities in D-Link DVG-5402SP VoIP Router |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
D-LinkDVG-5402SPVoIP is a wireless router product from D-Link. The D-Link DVG-5402 SPVoIP router has multiple cross-site request forgery vulnerabilities that can be exploited by remote attackers to perform unauthorized operations.
VAR-201708-1346 | CVE-2017-6756 | Cisco Prime Collaboration Provisioning Tool Vulnerable to cross-site request forgery |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the Web UI Application of the Cisco Prime Collaboration Provisioning Tool through 12.2 could allow an unauthenticated, remote attacker to execute unwanted actions. The vulnerability is due to a lack of defense against cross-site request forgery (CSRF) attacks. An attacker could exploit this vulnerability by forcing the user's browser to perform any action authorized for that user. Cisco Bug IDs: CSCvc90280. Vendors have confirmed this vulnerability Bug ID CSCvc90280 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state.
Exploiting this issue allows a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible. The tool provides IP communications services capabilities for IP telephony, voice mail, and unified communications environments
VAR-201711-0986 | CVE-2017-8148 | P9 Vulnerability related to race conditions in smartphone software |
CVSS V2: 5.4 CVSS V3: 4.7 Severity: MEDIUM |
Audio driver in P9 smartphones with software The versions before EVA-AL10C00B389 has a denial of service (DoS) vulnerability. An attacker tricks a user into installing a malicious application on the smart phone, and the race condition cause null pointer accessing during the application access shared resource, which make the system reboot. HuaweiP9 is a smartphone from China's Huawei company. Huawei Smart Phones are prone to a remote denial-of-service vulnerability.
Successful exploitation of the issue will cause the device to reboot, resulting in a denial-of-service condition
VAR-201708-1343 | CVE-2017-6747 | Cisco Identity Services Engine Authentication vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability in the authentication module of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to bypass local authentication. The vulnerability is due to improper handling of authentication requests and policy assignment for externally authenticated users. An attacker could exploit this vulnerability by authenticating with a valid external user account that matches an internal username and incorrectly receiving the authorization policy of the internal account. An exploit could allow the attacker to have Super Admin privileges for the ISE Admin portal. This vulnerability does not affect endpoints authenticating to the ISE. The vulnerability affects Cisco ISE, Cisco ISE Express, and Cisco ISE Virtual Appliance running Release 1.3, 1.4, 2.0.0, 2.0.1, or 2.1.0. Release 2.2.x is not affected. Cisco Bug IDs: CSCvb10995. Vendors have confirmed this vulnerability Bug ID CSCvb10995 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state.
An attacker can exploit this issue to bypass the authentication mechanism and obtains sensitive information. This may lead to further attacks. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies. ISE Express is a stripped down version of it. authentication moudle is one of the authentication modules. 0 version; ISE Virtual Appliance version 1.3, 1.4, 2.0.0, 2.0.1, 2.1.0
VAR-201708-1344 | CVE-2017-6752 | Cisco Adaptive Security Appliance Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) 9.3(3) and 9.6(2) could allow an unauthenticated, remote attacker to determine valid usernames. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to the interaction between Lightweight Directory Access Protocol (LDAP) and SSL Connection Profile when they are configured together. An attacker could exploit the vulnerability by performing a username enumeration attack to the IP address of the device. An exploit could allow the attacker to determine valid usernames. Cisco Bug IDs: CSCvd47888. Vendors have confirmed this vulnerability Bug ID CSCvd47888 It is released as.Information may be obtained. The appliance also includes IPS (Intrusion Prevention System), SSL VPN, IPSec VPN, anti-spam, and more
VAR-201708-1345 | CVE-2017-6754 | Cisco Smart Net Total Care Software Collector Appliance SQL Injection Vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the web-based management interface of the Cisco Smart Net Total Care (SNTC) Software Collector Appliance 3.11 could allow an authenticated, remote attacker to perform a read-only, blind SQL injection attack, which could allow the attacker to compromise the confidentiality of the system through SQL timing attacks. The vulnerability is due to insufficient input validation of certain user-supplied fields that are subsequently used by the affected software to build SQL queries. An attacker could exploit this vulnerability by submitting crafted URLs, which are designed to exploit the vulnerability, to the affected software. To execute an attack successfully, the attacker would need to submit a number of requests to the affected software. A successful exploit could allow the attacker to determine the presence of values in the SQL database of the affected software. Cisco Bug IDs: CSCvf07617. Vendors have confirmed this vulnerability Bug ID CSCvf07617 It is released as.Information may be obtained. Cisco SmartNetTotalCare (SNTC) Software is an intelligent network support service
VAR-201708-1347 | CVE-2017-6757 | Cisco Unified Communications Manager In SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in Cisco Unified Communications Manager 10.5(2.10000.5), 11.0(1.10000.10), and 11.5(1.10000.6) could allow an authenticated, remote attacker to conduct a blind SQL injection attack. The vulnerability is due to a failure to validate user-supplied input used in SQL queries that bypass protection filters. An attacker could exploit this vulnerability by sending crafted URLs that include SQL statements. An exploit could allow the attacker to modify or delete entries in some database tables, affecting the integrity of the data. Cisco Bug IDs: CSCve13786. Vendors have confirmed this vulnerability Bug ID CSCve13786 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
VAR-201708-1348 | CVE-2017-6758 | Cisco Unified Communications Manager Path traversal vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the web framework of Cisco Unified Communications Manager 11.5(1.10000.6) could allow an authenticated, remote attacker to access arbitrary files in the context of the web root directory structure on an affected device. The vulnerability is due to insufficient input validation by the affected software. An attacker could exploit this vulnerability by using directory traversal techniques to read files in the web root directory structure on the Cisco Unified Communications Manager filesystem. Cisco Bug IDs: CSCve13796. Vendors have confirmed this vulnerability Bug ID CSCve13796 It is released as.Information may be obtained.
Remote attackers may use a specially crafted request with directory-traversal sequences ('../') to retrieve sensitive information. This may aid in further attacks. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
VAR-201708-1349 | CVE-2017-6759 | Cisco Prime Collaboration Provisioning Tool Input validation vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the UpgradeManager of the Cisco Prime Collaboration Provisioning Tool 12.1 could allow an authenticated, remote attacker to write arbitrary files as root on the system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by triggering the upgrade package installation functionality. Cisco Bug IDs: CSCvc90304. Vendors have confirmed this vulnerability Bug ID CSCvc90304 It is released as.Information may be tampered with. This may aid in further attacks. The tool provides IP communications services capabilities for IP telephony, voice mail, and unified communications environments. UpgradeManager is one of the upgrade managers
VAR-201708-1351 | CVE-2017-6762 | Cisco Jabber Guest Server Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Jabber Guest Server 10.6(9), 11.0(0), and 11.0(1) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCve09718. Vendors have confirmed this vulnerability Bug ID CSCve09718 It is released as.Information may be obtained and information may be altered. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks
VAR-201708-1352 | CVE-2017-6763 | Cisco Meeting Server Input validation vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the implementation of the H.264 protocol in Cisco Meeting Server (CMS) 2.1.4 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability exists because the affected application does not properly validate Fragmentation Unit (FU-A) protocol packets. An attacker could exploit this vulnerability by sending a crafted H.264 FU-A packet through the affected application. A successful exploit could allow the attacker to cause a DoS condition on the affected system due to an unexpected restart of the CMS media process on the system. Although the CMS platform continues to operate and only the single, affected CMS media process is restarted, a brief interruption of media traffic for certain users could occur. Cisco Bug IDs: CSCve10131. Cisco Meeting Server (CMS) Contains an input validation vulnerability. Vendors have confirmed this vulnerability Bug ID CSCve10131 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state
VAR-201708-1354 | CVE-2017-6764 | Cisco Adaptive Security Appliance Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) 9.5(1) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvd82064. Vendors have confirmed this vulnerability Bug ID CSCvd82064 It is released as.Information may be obtained and information may be altered. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. The appliance also includes IPS (Intrusion Prevention System), SSL VPN, IPSec VPN, anti-spam, and more
VAR-201708-1355 | CVE-2017-6765 | Cisco Adaptive Security Appliance Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) 9.1(6.11) and 9.4(1.2) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device, aka WebVPN XSS. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCve19179. Vendors have confirmed this vulnerability Bug ID CSCve19179 It is released as.Information may be obtained and information may be altered. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. The appliance also includes IPS (Intrusion Prevention System), SSL VPN, IPSec VPN, anti-spam, and more
VAR-201708-1356 | CVE-2017-6766 | Cisco Firepower System Software Cryptographic vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the Secure Sockets Layer (SSL) Decryption and Inspection feature of Cisco Firepower System Software 5.4.0, 5.4.1, 6.0.0, 6.1.0, 6.2.0, 6.2.1, and 6.2.2 could allow an unauthenticated, remote attacker to bypass the SSL policy for decrypting and inspecting traffic on an affected system. The vulnerability is due to unexpected interaction with Known Key and Decrypt and Resign configuration settings of SSL policies when the affected software receives unexpected SSL packet headers. An attacker could exploit this vulnerability by sending a crafted SSL packet through an affected device in a valid SSL session. A successful exploit could allow the attacker to bypass the SSL decryption and inspection policy for the affected system, which could allow traffic to flow through the system without being inspected. Cisco Bug IDs: CSCve12652. Cisco Firepower System Software Contains a cryptographic vulnerability. Vendors have confirmed this vulnerability Bug ID CSCve12652 It is released as.Information may be tampered with.
Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions
VAR-201711-0938 | CVE-2017-8175 | Huawei Input Confirmation Vulnerability in Smartphone Software |
CVSS V2: 7.1 CVSS V3: 5.5 Severity: MEDIUM |
The Bastet of some Huawei mobile phones with software earlier than Vicky-AL00AC00B167 versions, earlier than Victoria-AL00AC00B167 versions, earlier than Warsaw-AL00C00B191 versions has an insufficient input validation vulnerability due to the lack of parameter validation. An attacker may trick a user into installing a malicious APP. The APP can modify specific parameter to cause system reboot. Huawei Smartphone software contains an input validation vulnerability.Denial of service (DoS) May be in a state. HuaweiVicky-AL00A/Victoria-AL00A/Warsaw-AL00 is a smartphone of China Huawei. Bastet is one of the data transfer assistance components. The vulnerability is due to insufficient detection parameters in the program
VAR-201708-0014 | CVE-2012-5030 | Cisco IOS Resource management vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
Cisco IOS before 15.2(4)S6 does not initialize an unspecified variable, which might allow remote authenticated users to cause a denial of service (CPU consumption, watchdog timeout, crash) by walking specific SNMP objects. Cisco IOS Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco IOS is an operating system developed by Cisco Systems for its network devices. A security vulnerability exists in versions prior to IOS 15.2(4)S6 that caused the program to fail to initialize variables