VARIoT IoT vulnerabilities database
| VAR-201712-0247 | CVE-2017-1550 | IBM Sterling File Gateway Vulnerabilities related to security functions |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
IBM Sterling File Gateway 2.2 could allow an authenticated user to change other user's passwords. IBM X-Force ID: 131290. Vendors have confirmed this vulnerability IBM X-Force ID: 131290 It is released as.Information may be tampered with.
Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. The software consolidates different centers of file transfer activity and facilitates the secure exchange of file-based data over the Internet. An attacker could exploit this vulnerability to change other users' passwords
| VAR-201712-0492 | CVE-2017-1487 | IBM Sterling File Gateway Vulnerable to information disclosure |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
IBM Sterling File Gateway 2.2 could allow an authenticated attacker to obtain sensitive information such as login ids on the system. IBM X-Force ID: 128626. Vendors have confirmed this vulnerability IBM X-Force ID: 128626 It is released as.Information may be obtained.
Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. The software consolidates different centers of file transfer activity and facilitates the secure exchange of file-based data over the Internet
| VAR-201712-0471 | CVE-2017-1497 | IBM Sterling File Gateway Vulnerable to information disclosure |
CVSS V2: 4.3 CVSS V3: 3.7 Severity: LOW |
IBM Sterling File Gateway 2.2 could allow an unauthorized user to view files they should not have access to providing they know the directory location of the file. IBM X-Force ID: 128695. Vendors have confirmed this vulnerability IBM X-Force ID: 128695 It is released as.Information may be obtained.
An attacker can exploit these issues using directory-traversal characters ('../') to access or read arbitrary files that contain sensitive information or to access files outside of the restricted directory or obtain sensitive information and perform other attacks. The software consolidates different centers of file transfer activity and facilitates the secure exchange of file-based data over the Internet
| VAR-201711-1234 | No CVE | Feiyuxing VE Series Router Has Unauthorized Access Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Feiyuxing VE series router 1021 firmware is a router product developed by Chengdu Feiyuxing Technology Development Co., Ltd.
Feiyuxing VE series router 1021 firmware has an unauthorized access vulnerability. An attacker could use this vulnerability to remotely change the administrator password to control the router.
| VAR-201711-1239 | No CVE | Information Disclosure Vulnerability in Flying Fish Star VE602W + Router |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Flying Fish Star VE602W + is a new Internet behavior management router developed by Chengdu Flying Fish Star Technology Development Co., Ltd.
There is an information disclosure vulnerability in the Flying Fish Star VE602W + router. The vulnerability is caused by the leak of the flying fish star VE602W + router administrator password hash. After the attacker uses the vulnerability to crack the hash to log in to the router, he can execute arbitrary shell commands through the unfiltered PING_HOSTIP parameter and obtain the telnet and ssh login account passwords.
| VAR-201711-1241 | No CVE | CSRF vulnerability in ZTE ZXV10 H108B wireless cat |
CVSS V2: 3.2 CVSS V3: - Severity: LOW |
ZXV10 H108B is a wireless broadband router cat.
The ZRF ZXV10 H108B wireless cat has a CSRF vulnerability that allows an attacker to hijack the administrator's identity and modify the wireless cat's DNS settings.
| VAR-201711-0644 | CVE-2017-5705 | Intel Manageability Engine Buffer Overflow Vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Multiple buffer overflows in kernel in Intel Manageability Engine Firmware 11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets.
Local attackers can exploit these issues to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. The following products and versions are affected: Intel Manageability Engine Firmware Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
| VAR-201711-0645 | CVE-2017-5706 | Intel Server Platform Services Firmware Buffer Overflow Vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Multiple buffer overflows in kernel in Intel Server Platform Services Firmware 4.0 allow attacker with local access to the system to execute arbitrary code. Multiple Oracle Server products are prone to multiple local security vulnerabilities.
These vulnerabilities affect the following supported versions:
1.0 and 1.0.1. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. The program supports remote access and management of servers. The following products are affected: 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03798en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03798en_us
Version: 1
HPESBHF03798 rev.1 - HPE Proliant Gen10 Servers, DL20 Gen9, ML30 Gen9 and
Certain Apollo Servers Using Intel Server Platform Service (SPS) v4.0, Local
Denial of Service and Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-11-21
Last Updated: 2017-11-21
Potential Security Impact: Local: Denial of Service (DoS), Execution of
Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
A vulnerability in HPE certain Gen10 Servers, DL20 Gen9, ML30 Gen9 and
certain Apollo servers with Intel Server Platform Service (SPS) v4.0 are
vulnerable to local Denial of Service and execution of arbitrary code.
**Note:** Intel has identified security vulnerabilities which could
potentially place impacted platforms at risk. The SPS/ME firmware
used in Intels architecture can be compromised with physical access such
that non-authenticated code may be executed in the SPS environment outside of
the visibility of the user and operating system administrator.
- HPE Apollo 2000 System ROM firmware prior to v1.26
- HPE Apollo 4510 System ROM firmware prior to v1.26
- HPE Apollo 6000 DLC System ROM firmware prior to v1.26
- HPE ProLiant BL460c Gen10 Server Blade ROM firmware prior to v1.26
- HPE ProLiant DL20 Gen9 Server SPS Firmware prior to v4.01.04.054
- HPE ProLiant DL360 Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant DL380 Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant DL560 Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant DL580 Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant m710x Server Cartridge ROM firmware prior to v1.26
- HPE ProLiant ML30 Gen9 Server SPS Firmware prior to 4.01.04.054
- HPE ProLiant ML110 Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant ML350 Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant XL170r Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant XL190r Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant XL230k Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant XL450 Gen10 Server ROM firmware prior to v1.26
- HPE Synergy 660 Gen10 Compute Module ROM firmware prior to v1.26, SPS
firmware prior to 04.00.04.28
- HPE Synergy 480 Gen10 Compute Module ROM firmware prior to v1.26, SPS
firmware prior to 04.00.04.28
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2017-5706
7.4 CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVE-2017-5709
7.4 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
5.6 (AV:L/AC:H/Au:N/C:C/I:C/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following response to resolve the vulnerabilities in
SPS. HPE is working closely with Intel to ensure timely resolution of this
issue on HPE systems. HPE will resolve this vulnerability in our servers in
the following ways.
* For customers that currently have impacted HPE ProLiant and Synergy servers
at their locations, are available for download from HPEs support site.
Customers should refer to the Customer Bulletin HPE Servers:
* [Some Systems Using Certain Intel Processors Are Vulnerable to Local
Denial of Service and Execution of Arbitrary Code for detailed
instructions](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a0
036596en_us)
HISTORY
Version:1 (rev.1) - 21 November 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBCAAGBQJaFEmSAAoJELXhAxt7SZaiDlYH+gOhwTGNWGwKgHM443u5FL7l
lq4v46iIYbFDRVPt6Ffh+I1YdjvclJ/EsQsJQiCdRqdBwUVCm31aBsRPD/Xk+fbn
rrSLw7b2Eqyxy+F1Xe5Uoxwy7sOg1mROL7oQmst19cuWUgH8XX899+UQ/At2ikiM
PoZDIthRb2KjnvyG0uLCkomWBKGxsnBCkDWd8tXw9AmsYmAPXlPPTcHZHxeDyGpm
A/z214HFWRDg/xUf36VHQ2vp5Bung4auFMnwYdVFYciQZAJHzB1rALkVIXDqdNIL
R243Vf6tGN2vQzqxr5enb0Mi9TCvQ2uDMPPpzObfDKhnYVVIwOPvbshlDuCFD4E=
=4PaY
-----END PGP SIGNATURE-----
| VAR-201711-0646 | CVE-2017-5707 | Intel Trusted Execution Engine Firmware Buffer error vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Multiple buffer overflows in kernel in Intel Trusted Execution Engine Firmware 3.0 allow attacker with local access to the system to execute arbitrary code. IntelTrustedExecutionEngineFirmware is a trusted execution engine firmware product. There are multiple local buffer overflow vulnerabilities in IntelTrustedExecutionEngine. Failed exploit attempts will likely result in denial-of-service conditions. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. The following products are affected: Intel 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
| VAR-201711-0647 | CVE-2017-5708 | Intel Manageability Engine Firmware Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Multiple privilege escalations in kernel in Intel Manageability Engine Firmware 11.0/11.5/11.6/11.7/11.10/11.20 allow unauthorized process to access privileged content via unspecified vector. Intel Manageability Engine Firmware Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. An attacker could exploit the vulnerability to access privileged content. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. kernel is one of the kernels. The following products and versions are affected: Intel Manageability Engine Firmware Firmware Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
| VAR-201711-0648 | CVE-2017-5709 | Intel Server Platform Services Firmware Vulnerabilities in authorization, authority and access control |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Multiple privilege escalations in kernel in Intel Server Platform Services Firmware 4.0 allows unauthorized process to access privileged content via unspecified vector. IntelServerPlatformServicesFirmware is a server platform service program used in the CPU (Central Processing Unit). Multiple Oracle Server products are prone to multiple local security vulnerabilities.
These vulnerabilities affect the following supported versions:
1.0 and 1.0.1. The program supports remote access and management of servers. kernel is one of the kernels. The following products are affected: Intel 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03798en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03798en_us
Version: 1
HPESBHF03798 rev.1 - HPE Proliant Gen10 Servers, DL20 Gen9, ML30 Gen9 and
Certain Apollo Servers Using Intel Server Platform Service (SPS) v4.0, Local
Denial of Service and Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-11-21
Last Updated: 2017-11-21
Potential Security Impact: Local: Denial of Service (DoS), Execution of
Arbitrary Code
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
A vulnerability in HPE certain Gen10 Servers, DL20 Gen9, ML30 Gen9 and
certain Apollo servers with Intel Server Platform Service (SPS) v4.0 are
vulnerable to local Denial of Service and execution of arbitrary code.
**Note:** Intel has identified security vulnerabilities which could
potentially place impacted platforms at risk. An issue impacts Intel Server
Platform Service (SPS) v4.0 used in certain HPE servers. The SPS/ME firmware
used in Intels architecture can be compromised with physical access such
that non-authenticated code may be executed in the SPS environment outside of
the visibility of the user and operating system administrator.
- HPE Apollo 2000 System ROM firmware prior to v1.26
- HPE Apollo 4510 System ROM firmware prior to v1.26
- HPE Apollo 6000 DLC System ROM firmware prior to v1.26
- HPE ProLiant BL460c Gen10 Server Blade ROM firmware prior to v1.26
- HPE ProLiant DL20 Gen9 Server SPS Firmware prior to v4.01.04.054
- HPE ProLiant DL360 Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant DL380 Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant DL560 Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant DL580 Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant m710x Server Cartridge ROM firmware prior to v1.26
- HPE ProLiant ML30 Gen9 Server SPS Firmware prior to 4.01.04.054
- HPE ProLiant ML110 Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant ML350 Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant XL170r Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant XL190r Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant XL230k Gen10 Server ROM firmware prior to v1.26
- HPE ProLiant XL450 Gen10 Server ROM firmware prior to v1.26
- HPE Synergy 660 Gen10 Compute Module ROM firmware prior to v1.26, SPS
firmware prior to 04.00.04.28
- HPE Synergy 480 Gen10 Compute Module ROM firmware prior to v1.26, SPS
firmware prior to 04.00.04.28
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2017-5706
7.4 CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVE-2017-5709
7.4 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
5.6 (AV:L/AC:H/Au:N/C:C/I:C/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following response to resolve the vulnerabilities in
SPS. HPE is working closely with Intel to ensure timely resolution of this
issue on HPE systems. HPE will resolve this vulnerability in our servers in
the following ways.
* For customers that currently have impacted HPE ProLiant and Synergy servers
at their locations, are available for download from HPEs support site.
Customers should refer to the Customer Bulletin HPE Servers:
* [Some Systems Using Certain Intel Processors Are Vulnerable to Local
Denial of Service and Execution of Arbitrary Code for detailed
instructions](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a0
036596en_us)
HISTORY
Version:1 (rev.1) - 21 November 2017 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBCAAGBQJaFEmSAAoJELXhAxt7SZaiDlYH+gOhwTGNWGwKgHM443u5FL7l
lq4v46iIYbFDRVPt6Ffh+I1YdjvclJ/EsQsJQiCdRqdBwUVCm31aBsRPD/Xk+fbn
rrSLw7b2Eqyxy+F1Xe5Uoxwy7sOg1mROL7oQmst19cuWUgH8XX899+UQ/At2ikiM
PoZDIthRb2KjnvyG0uLCkomWBKGxsnBCkDWd8tXw9AmsYmAPXlPPTcHZHxeDyGpm
A/z214HFWRDg/xUf36VHQ2vp5Bung4auFMnwYdVFYciQZAJHzB1rALkVIXDqdNIL
R243Vf6tGN2vQzqxr5enb0Mi9TCvQ2uDMPPpzObfDKhnYVVIwOPvbshlDuCFD4E=
=4PaY
-----END PGP SIGNATURE-----
| VAR-201711-0649 | CVE-2017-5710 | Intel Trusted Execution Engine Firmware Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Multiple privilege escalations in kernel in Intel Trusted Execution Engine Firmware 3.0 allows unauthorized process to access privileged content via unspecified vector. IntelTrustedExecutionEngineFirmware is a trusted execution engine firmware product. There are multiple local privilege elevation vulnerabilities in IntelTrustedExecutionEngine. An attacker could exploit the vulnerability to access privileged content. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. kernel is one of the kernels. The following products are affected: Intel 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
| VAR-201711-0650 | CVE-2017-5711 | Intel Manageability Engine Firmware of Active Management Technology Buffer error vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. Failed exploit attempts will likely result in denial-of-service conditions.
Intel Manageability Engine versions 8.x, 9.x, 10.x, 11.0,11.5,11.6,11.7,11.10, and 11.20 are vulnerable. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. Active Management Technology (AMT) is one of the active management components. The following products and versions are affected: Intel Manageability Engine Firmware Versions 8.x, 9.x, 10.x, 11.0, 11.5, 11.6, 11.7, 11.10, 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
| VAR-201711-0651 | CVE-2017-5712 | Intel Manageability Engine Firmware of Active Management Technology Buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. Failed exploits may result in denial-of-service conditions.
Intel Manageability Engine versions 8.x, 9.x, 10.x, 11.0,11.5, 11.6, 11.7, 11.10, and 11.20 are vulnerable. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. Active Management Technology (AMT) is one of the active management components. The following products and firmware are affected: Intel Manageability Engine Firmware Version 8.x, Version 9.x, Version 10.x, Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; Intel 6th, 7th and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
| VAR-201711-0521 | CVE-2017-16902 |
Vonage VDV-23 Home router buffer error vulnerability
Related entries in the VARIoT exploits database: VAR-E-201711-0245 |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
On the Vonage VDV-23 115 3.2.11-0.9.40 home router, sending a long string of characters in the loginPassword and/or loginUsername field to goform/login causes the router to reboot. Vonage VDV-23 Home routers contain a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. VonageVDV-23115 is a routing repeater from Vonage Corporation of the United States. A security vulnerability exists in the Vonage VDV-231153.2.11-0.9.40 release
| VAR-201712-0797 | CVE-2017-15310 | Huawei iReader Application input validation vulnerability |
CVSS V2: 5.8 CVSS V3: 6.5 Severity: MEDIUM |
Huawei iReader app before 8.0.2.301 has an arbitrary file deletion vulnerability due to the lack of input validation. An attacker can exploit this vulnerability to delete specific files from the SD card. Huawei iReader The application contains an input validation vulnerability.Information may be tampered with. Huawei iReader is a built-in e-book reading application for Huawei mobile phones produced by China's Huawei (Huawei)
| VAR-201712-0795 | CVE-2017-15308 | Huawei iReader Application input validation vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Huawei iReader app before 8.0.2.301 has an input validation vulnerability due to insufficient validation on the URL used for loading network data. An attacker can control app access and load malicious websites created by the attacker, and the code in webpages would be loaded and run. Huawei iReader The application contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows local attackers to escalate privileges on vulnerable installations of Huawei Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of plugins. The issue results from the storage of plugins in an insecure location. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current user. Huawei iReader is a built-in e-book reading application for Huawei mobile phones produced by China's Huawei (Huawei)
| VAR-201712-0796 | CVE-2017-15309 | Huawei iReader Application path traversal vulnerability |
CVSS V2: 5.8 CVSS V3: 7.1 Severity: HIGH |
Huawei iReader app before 8.0.2.301 has a path traversal vulnerability due to insufficient validation on file storage paths. An attacker can exploit this vulnerability to store downloaded malicious files in an arbitrary directory. Huawei iReader The application contains a path traversal vulnerability.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of the onChapPack function. Huawei iReader is a built-in e-book reading application for Huawei mobile phones produced by China's Huawei (Huawei)
| VAR-201711-1240 | No CVE | Tiandi Albert Announces Information Disclosure Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Tiandi Weiye Technology Co., Ltd. is an Internet of Things company whose main business is the research and development, production and sales of video surveillance products. With "Horizon as the World" as its corporate mission, it is a national enterprise technology center and a national and local joint engineering laboratory.
There is an information disclosure vulnerability in Tiandiweiye Network Camera, which is due to failure to properly control camera permissions. The attacker directly obtains the system username and password by sending a specific data packet.
| VAR-201711-0280 | CVE-2017-1000230 | Snap7 Server Denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The Snap7 Server version 1.4.1 can be crashed when the ItemCount field of the ReadVar or WriteVar functions of the S7 protocol implementation in Snap7 are provided with unexpected input, thus resulting in denial of service attack. Snap7 The server contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Snap7 is an open source multi-platform Ethernet communications suite for local connectivity to PLCs. Snap7 Server is one of the server components. There is a security vulnerability in Snap7 Server version 1.4.1. An attacker could exploit the vulnerability to cause a denial of service (crash)