VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201712-0200 CVE-2017-15893 Synology File Station Path traversal vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Directory traversal vulnerability in the SYNO.FileStation.Extract in Synology File Station before 1.1.1-0099 allows remote authenticated users to write arbitrary files via the dest_folder_path parameter. Synology File Station Contains a path traversal vulnerability.Information may be tampered with. This tool enables users to access files on Synology NAS devices via the web
VAR-201712-0199 CVE-2017-15892 Synology Chat Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in Slash Command Creator in Synology Chat before 2.0.0-1124 allow remote authenticated users to inject arbitrary web script or HTML via (1) COMMAND, (2) COMMANDS INSTRUCTION, or (3) DESCRIPTION parameter. Synology Chat Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Synology Chat is an instant chat tool developed by Synology. Slash Command Creator is one of the Slash command tools
VAR-201712-0198 CVE-2017-15891 Synology Calendar Access control vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Improper access control vulnerability in SYNO.Cal.EventBase in Synology Calendar before 2.0.1-0242 allows remote authenticated users to modify calendar event via unspecified vectors. Synology Calendar is a file protection program from Synology that runs on Synology NAS devices. A remote attacker could exploit this vulnerability to change a calendar's events
VAR-201712-0197 CVE-2017-15890 Synology MailPlus Server Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in Disclaimer in Synology MailPlus Server before 1.4.0-0415 allows remote authenticated users to inject arbitrary web script or HTML via the NAME parameter. Synology MailPlus Server Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Synology MailPlus Server is an email service suite from Synology. The product supports the management of user accounts, mail records, etc. Disclaimer is one of the disclaimer modules
VAR-201712-0196 CVE-2017-15889 Synology DiskStation Manager Command injection vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Command injection vulnerability in smart.cgi in Synology DiskStation Manager (DSM) before 5.2-5967-5 allows remote authenticated users to execute arbitrary commands via disk field. Synology DiskStation Manager (DSM) is an operating system developed by Synology for network storage servers (NAS). The operating system can manage data, documents, photos, music and other information. The smart.cgi file in versions earlier than Synology DSM 5.2-5967-5 has a command injection vulnerability
VAR-201712-0195 CVE-2017-15886 Synology Chat Server-side request forgery vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Server-side request forgery (SSRF) vulnerability in Link Preview in Synology Chat before 2.0.0-1124 allows remote authenticated users to download arbitrary local files via a crafted URI. Synology Chat Contains a server-side request forgery vulnerability.Information may be obtained. Synology Chat is an instant chat tool developed by Synology. Link Preview is one of the link preview components
VAR-201711-0208 CVE-2017-15887 Synology CardDAV Server Vulnerabilities related to certificate and password management CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
An improper restriction of excessive authentication attempts vulnerability in /principals in Synology CardDAV Server before 6.0.7-0085 allows remote attackers to obtain user credentials via a brute-force attack. Synology CardDAV Server Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Synology CardDAV Server is an application from Synology for synchronizing contacts. There is a security vulnerability in /principals in Synology CardDAV Server versions earlier than 6.0.7-0085. The vulnerability is due to the fact that the program does not limit the number of authentication times
VAR-201710-0499 CVE-2017-15888 Synology Audio Station Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in Custom Internet Radio List in Synology Audio Station before 6.3.0-3260 allows remote authenticated attackers to inject arbitrary web script or HTML via the NAME parameter. Synology Audio Station Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Synology Audio Station is an audio manager from Synology
VAR-201710-1446 No CVE Xerox Printers Certification Bypass Vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
XeroxPrinters is a Fuji Xerox (China) Co., Ltd. printer and MFP for SMEs and individual families. XeroxPrinters has a certification bypass vulnerability. An attacker exploits a vulnerability to enforce authentication.
VAR-201710-0735 CVE-2017-3771 Lenovo E95 and ThinkCentre M710s/M710t Vulnerabilities related to security functions CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
System boot process is not adequately secured In Lenovo E95 and ThinkCentre M710s/M710t because systems were shipped from factory without completing BIOS/UEFI initialization process. Lenovo E95 , ThinkCentre M710s and M710t Contains vulnerabilities related to security features.Information may be tampered with. LenovoE95 and ThinkCentreM710s/M710t are desktop computers of Lenovo China. An attacker could exploit this vulnerability to run a boot loader at system startup, reducing the protection of rootkits
VAR-201710-1067 CVE-2017-6159 plural F5 BIG-IP Resource management vulnerabilities in products CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM, Websafe software version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1 are vulnerable to a denial of service attack when the MPTCP option is enabled on a virtual server. Data plane is vulnerable when using the MPTCP option of a TCP profile. There is no control plane exposure. An attacker may be able to disrupt services by causing TMM to restart hence temporarily failing to process traffic. plural F5 BIG-IP The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP products are prone to a denial-of-service vulnerability. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. LTM is a local traffic manager; APM is a solution that provides secure unified access to business-critical applications and networks. Traffic Management Microkernel (TMM) is one of the service processes that performs traffic management. The following products and versions are affected: F5 BIG-IP LTM Version 12.0.0 through 12.1.2, Version 11.6.0 through Version 11.6.1; BIG-IP AAM Version 12.0.0 through Version 12.1.2, Version 11.6.0 to 11.6.1; BIG-IP AFM 12.0.0 to 12.1.2, 11.6.0 to 11.6.1; BIG-IP Analytics 12.0.0 to 12.1.2, 11.6.0 to 11.6 .1 version; BIG-IP APM version 12.0.0 through 12.1.2, version 11.6.0 through version 11.6.1; BIG-IP ASM version 12.0.0 through version 12.1.2, version 11.6.0 through 11.6.1 Versions; BIG-IP DNS version 12.0.0 to 12.1.2; BIG-IP GTM version 11.6.0 to 11.6.1; BIG-IP Link Controller version 12.0.0 to 12.1.2, 11.6.0 to Version 11.6.1; BIG-IP PEM Version 12.0.0 through Version 12.1.2, Version 11.6.0 through Version 11.6.1; BIG-IP WebSafe Version 12.0.0 through Version 12.1.2, Version 11.6.0 through Version 11.6. 1 version
VAR-201710-1313 CVE-2017-6161 plural F5 BIG-IP Product depletion vulnerability CVSS V2: 2.9
CVSS V3: 5.3
Severity: MEDIUM
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator software version 12.0.0 - 12.1.2, 11.6.0 - 11.6.1, 11.4.0 - 11.5.4, 11.2.1, when ConfigSync is configured, attackers on adjacent networks may be able to bypass the TLS protections usually used to encrypted and authenticate connections to mcpd. This vulnerability may allow remote attackers to cause a denial-of-service (DoS) attack via resource exhaustion. plural F5 BIG-IP The product is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP Products are prone to a security-bypass vulnerability. Successfully exploiting this issue may allow attackers to perform unauthorized actions. This may lead to other attacks. F5 BIG-IP LTM, etc. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager
VAR-201710-1314 CVE-2017-6162 plural F5 BIG-IP Product buffer error vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, Websafe software version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4, 11.2.1, in some cases TMM may crash when processing TCP traffic. This vulnerability affects TMM via a virtual server configured with TCP profile. Traffic processing is disrupted while Traffic Management Microkernel (TMM) restarts. If the affected BIG-IP system is configured to be part of a device group, it will trigger a failover to the peer device. plural F5 BIG-IP The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP products are prone to a denial-of-service vulnerability. A remote attacker can exploit this issue to cause the service to restart resulting in a denial-of-service condition. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. LTM is a local traffic manager; APM is a solution that provides secure unified access to business-critical applications and networks. The following products and versions are affected: BIG-IP LTM version 12.0.0 to version 12.1.2, version 11.6.0 to version 11.6.12, version 11.4.1 to version 11.5.42, version 11.2.1; BIG-IP Analytics 12.0.0 to 12.1.2, 11.6.0 to 11.6.12, 11.4.1 to 11.5.42, 11.2.1; BIG-IP APM 12.0.0 to 12.1.2, 11.6 .0 to 11.6.12, 11.4.1 to 11.5.42, 11.2.1; BIG-IP ASM 12.0.0 to 12.1.2, 11.6.0 to 11.6.12, 11.4. 1 to 11.5.42, 11.2.1; BIG-IP Link Controller 12.0.0 to 12.1.2, 11.6.0 to 11.6.12, 11.4.1 to 11.5.42, 11.2. 1 version; BIG-IP AAM version 12.0.0 to 12.1.2, 11.6.0 to 11.6.12, 11.4.1 to 11.5.42; BIG-IP AFM version 12.0.0 to 12.1.2 , version 11.6.0 to version 11.6.12, version 11.4.1 to version 11.5.42; BIG-IP PEM version 12.0.0 to version 12.1.2, version 11.6.0 to version 11.6.12, version 11.4.1 to Version 11.5.42; BIG-IP DNS versions 12.0.0 through 12.1.2; BIG-IP Edge Gateway 11.2
VAR-201710-1315 CVE-2017-6163 plural F5 BIG-IP Product buffer error vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, PSM software version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4, when a virtual server uses the standard configuration of HTTP/2 or SPDY profile with Client SSL profile, and the client initiates a number of concurrent streams beyond the advertised limit can cause a disruption of service. Remote client initiating stream beyond the advertised limit can cause a disruption of service. The Traffic Management Microkernel (TMM) data plane is exposed to this issue; the control plane is not exposed. plural F5 BIG-IP The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP products are prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager. The following products and versions are affected: F5 BIG-IP LTM version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4; BIG-IP AAM version 12.0.0 to version 12.1.2, version 11.6.0 to version 11.6.1, version 11.4.0 to version 11.5.4; BIG-IP AFM version 12.0.0 to version 12.1.2, version 11.6.0 to version 11.6.1, 11.4.0 to 11.5.4; BIG-IP APM 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4; BIG-IP ASM 12.0. 0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4; BIG-IP Link Controller 12.0.0 to 12.1.2, 11.6.0 to 11.6. 1 release, 11.4.0 to 11.5.4 release; BIG-IP PEM release 12.0.0 to 12.1.2 release, 11.6.0 release to 11.6.1 release, 11.4.0 release to 11.5.4 release; BIG-IP PSM version 11.4.0 to version 11.4.1
VAR-201710-1068 CVE-2017-6160 F5 BIG-IP AAM and PEM Vulnerabilities in resource management CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In F5 BIG-IP AAM and PEM software version 12.0.0 to 12.1.1, 11.6.0 to 11.6.1, 11.4.1 to 11.5.4, a remote attacker may create maliciously crafted HTTP request to cause Traffic Management Microkernel (TMM) to restart and temporarily fail to process traffic. This issue is exposed on virtual servers using a Policy Enforcement profile or a Web Acceleration profile. Systems that do not have BIG-IP AAM module provisioned are not vulnerable. The Traffic Management Microkernel (TMM) may restart and temporarily fail to process traffic. Systems that do not have BIG-IP AAM or PEM module provisioned are not vulnerable. F5 BIG-IP AAM and PEM Contains a resource management vulnerability.Denial of service (DoS) May be in a state. Multiple F5 BIG-IP products are prone to a denial-of-service vulnerability. A remote attacker can exploit this issue to cause the service to restart resulting in a denial-of-service condition. F5 BIG-IP AAM is an application acceleration manager. PEM is a policy enforcement manager. F5 BIG-IP AAM and PEM have security vulnerabilities. The following products and versions are affected: F5 BIG-IP AAM Version 12.0.0 through 12.1.1, Version 11.6.0 through Version 11.6.1, Version 11.4.1 through Version 11.5.4; BIG-IP PEM Version 12.0.0 to version 12.1.1, version 11.6.0 to version 11.6.1, version 11.4.1 to version 11.5.4
VAR-201710-0498 CVE-2017-15885 Axis 2100 Network Camera Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Reflected XSS in the web administration portal on the Axis 2100 Network Camera 2.03 allows an attacker to execute arbitrary JavaScript via the conf_Layout_OwnTitle parameter to view/view.shtml. NOTE: this might overlap CVE-2007-5214. Axis 2100 Network Camera Contains a cross-site scripting vulnerability. The problem is CVE-2007-5214 And may overlap.Information may be obtained and information may be altered. The Axis2100NetworkCamera is a wireless camera product from Axis, Sweden. Webadministrationportal is one of the web management pages
VAR-201712-1083 CVE-2017-6679 Cisco Umbrella Vulnerabilities related to security functions in virtual appliances CVSS V2: 6.0
CVSS V3: 6.4
Severity: MEDIUM
The Cisco Umbrella Virtual Appliance Version 2.0.3 and prior contained an undocumented encrypted remote support tunnel (SSH) which auto initiated from the customer's appliance to Cisco's SSH Hubs in the Umbrella datacenters. These tunnels were primarily leveraged for remote support and allowed for authorized/authenticated personnel from the Cisco Umbrella team to access the appliance remotely and obtain full control without explicit customer approval. To address this vulnerability, the Umbrella Virtual Appliance version 2.1.0 now requires explicit customer approval before an SSH tunnel from the VA to the Cisco terminating server can be established. Cisco Umbrella Virtual appliances contain vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscoUmbrellaVirtualAppliance is a cloud-based secure Internet gateway device from Cisco. A security vulnerability exists in Cisco Umbrella VirtualAppliance 2.0.3 and earlier. This vulnerability could be exploited by a remote attacker to gain access to the device and to fully control the device. This may lead to further attacks. Timeline December 22, 2015 - Notified OpenDNS via security@opendns.com December 22, 2015 - OpenDNS responded stating that they will investigate January 4, 2016 - Asked for an update on their investigation January 11, 2016 - OpenDNS said they are working through a number of options to resolve the issue February 2, 2016 - OpenDNS advised they've shortlisted a couple of solutions and will provide another update in a week or so February 17, 2016 - OpenDNS said they would like to schedule a call to discuss February 24, 2016 - Had a call with OpenDNS to discuss possible solutions April 22, 2016 - Asked for an update on the progress of the fix May 3, 2016 - Asked for an update on the progress of the fix July 27, 2016 - Sent the vulnerability details to the Cisco PSIRT team July 29, 2016 - Cisco assigned a case number and asked to schedule a call to discuss August 17, 2016 - Had a call with the Cisco PSIRT team to discuss possible solutions September 26, 2016 - Asked for an update on the progress of the fix October 6, 2016 - Cisco provided a status update December 14, 2016 - Asked for an update on the progress of the fix December 19, 2016 - Cisco provided a status update January 10, 2017 - Asked for an update on the progress of the fix January 10, 2017 - Cisco provided a status update May 26, 2017 - Cisco assigned CVE-2017-6679 and advised that the issue would be made public in the next week June 2, 2017 - Cisco asked to move the disclosure date to August 31, 2017 August 30, 2017 - Cisco released virtual appliance version 2.1.0 which resolves this vulnerability by removing the undocumented reverse SSH tunnel September 21, 2017 - Cisco published a security advisory to document this issue Solution Upgrade to virtual appliance 2.1.0 or later https://support.umbrella.com/hc/en-us/articles/115004752143-Virtual-Appliance-Vulnerability-due-to-always-on-SSH-Tunnel-RESOLVED-2017-09-15 CVE-ID: CVE-2017-6679
VAR-201801-0535 CVE-2017-15653 ASUSWRT Session expiration vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Improper administrator IP validation after his login in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allows an unauthorized user to execute any action knowing administrator session token by using a specific User-Agent string. ASUSWRT Contains a session expiration vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUSWRT is the unified firmware used by ASUS in its latest routers and is the web-based graphical user interface of the ASUS router. The HTTPd server in Asusasuswrt 3.0.0.4.380.7743 and earlier has a login user IP verification vulnerability. An attacker who knows the session token can exploit the vulnerability to bypass the IP authentication mechanism and perform any action by sending a request with a special useragent. HTTPd server is one of the HTTP servers
VAR-201801-0536 CVE-2017-15654 Asus asuswrt Access control vulnerability CVSS V2: 7.6
CVSS V3: 8.3
Severity: HIGH
Highly predictable session tokens in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allow gaining administrative router access. Asus asuswrt Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUSWRT is the unified firmware used by ASUS in its latest routers and is the web-based graphical user interface of the ASUS router. An attacker could exploit this vulnerability to gain access to the router administrator. HTTPd server is one of the HTTP servers. The vulnerability is caused by the program generating easily guessable session tokens
VAR-201801-0538 CVE-2017-15656 Asus asuswrt Vulnerabilities related to certificate and password management CVSS V2: 4.0
CVSS V3: 8.8
Severity: HIGH
Password are stored in plaintext in nvram in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt. Asus asuswrt Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUSWRT is the unified firmware used by ASUS in its latest routers and is the web-based graphical user interface of the ASUS router. A plaintext password storage vulnerability exists in Asusasuswrt 3.0.0.4.380.7743 and earlier. An attacker could exploit the vulnerability to obtain password information. HTTPd server is one of the HTTP servers