VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201712-0247 CVE-2017-1550 IBM Sterling File Gateway Vulnerabilities related to security functions CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
IBM Sterling File Gateway 2.2 could allow an authenticated user to change other user's passwords. IBM X-Force ID: 131290. Vendors have confirmed this vulnerability IBM X-Force ID: 131290 It is released as.Information may be tampered with. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. The software consolidates different centers of file transfer activity and facilitates the secure exchange of file-based data over the Internet. An attacker could exploit this vulnerability to change other users' passwords
VAR-201712-0492 CVE-2017-1487 IBM Sterling File Gateway Vulnerable to information disclosure CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
IBM Sterling File Gateway 2.2 could allow an authenticated attacker to obtain sensitive information such as login ids on the system. IBM X-Force ID: 128626. Vendors have confirmed this vulnerability IBM X-Force ID: 128626 It is released as.Information may be obtained. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. The software consolidates different centers of file transfer activity and facilitates the secure exchange of file-based data over the Internet
VAR-201712-0471 CVE-2017-1497 IBM Sterling File Gateway Vulnerable to information disclosure CVSS V2: 4.3
CVSS V3: 3.7
Severity: LOW
IBM Sterling File Gateway 2.2 could allow an unauthorized user to view files they should not have access to providing they know the directory location of the file. IBM X-Force ID: 128695. Vendors have confirmed this vulnerability IBM X-Force ID: 128695 It is released as.Information may be obtained. An attacker can exploit these issues using directory-traversal characters ('../') to access or read arbitrary files that contain sensitive information or to access files outside of the restricted directory or obtain sensitive information and perform other attacks. The software consolidates different centers of file transfer activity and facilitates the secure exchange of file-based data over the Internet
VAR-201711-1234 No CVE Feiyuxing VE Series Router Has Unauthorized Access Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Feiyuxing VE series router 1021 firmware is a router product developed by Chengdu Feiyuxing Technology Development Co., Ltd. Feiyuxing VE series router 1021 firmware has an unauthorized access vulnerability. An attacker could use this vulnerability to remotely change the administrator password to control the router.
VAR-201711-1239 No CVE Information Disclosure Vulnerability in Flying Fish Star VE602W + Router CVSS V2: 9.0
CVSS V3: -
Severity: HIGH
Flying Fish Star VE602W + is a new Internet behavior management router developed by Chengdu Flying Fish Star Technology Development Co., Ltd. There is an information disclosure vulnerability in the Flying Fish Star VE602W + router. The vulnerability is caused by the leak of the flying fish star VE602W + router administrator password hash. After the attacker uses the vulnerability to crack the hash to log in to the router, he can execute arbitrary shell commands through the unfiltered PING_HOSTIP parameter and obtain the telnet and ssh login account passwords.
VAR-201711-1241 No CVE CSRF vulnerability in ZTE ZXV10 H108B wireless cat CVSS V2: 3.2
CVSS V3: -
Severity: LOW
ZXV10 H108B is a wireless broadband router cat. The ZRF ZXV10 H108B wireless cat has a CSRF vulnerability that allows an attacker to hijack the administrator's identity and modify the wireless cat's DNS settings.
VAR-201711-0644 CVE-2017-5705 Intel Manageability Engine Buffer Overflow Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Multiple buffer overflows in kernel in Intel Manageability Engine Firmware 11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. Local attackers can exploit these issues to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. The following products and versions are affected: Intel Manageability Engine Firmware Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
VAR-201711-0645 CVE-2017-5706 Intel Server Platform Services Firmware Buffer Overflow Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Multiple buffer overflows in kernel in Intel Server Platform Services Firmware 4.0 allow attacker with local access to the system to execute arbitrary code. Multiple Oracle Server products are prone to multiple local security vulnerabilities. These vulnerabilities affect the following supported versions: 1.0 and 1.0.1. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. The program supports remote access and management of servers. The following products are affected: 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03798en_us SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: hpesbhf03798en_us Version: 1 HPESBHF03798 rev.1 - HPE Proliant Gen10 Servers, DL20 Gen9, ML30 Gen9 and Certain Apollo Servers Using Intel Server Platform Service (SPS) v4.0, Local Denial of Service and Execution of Arbitrary Code NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2017-11-21 Last Updated: 2017-11-21 Potential Security Impact: Local: Denial of Service (DoS), Execution of Arbitrary Code Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY A vulnerability in HPE certain Gen10 Servers, DL20 Gen9, ML30 Gen9 and certain Apollo servers with Intel Server Platform Service (SPS) v4.0 are vulnerable to local Denial of Service and execution of arbitrary code. **Note:** Intel has identified security vulnerabilities which could potentially place impacted platforms at risk. The SPS/ME firmware used in Intels architecture can be compromised with physical access such that non-authenticated code may be executed in the SPS environment outside of the visibility of the user and operating system administrator. - HPE Apollo 2000 System ROM firmware prior to v1.26 - HPE Apollo 4510 System ROM firmware prior to v1.26 - HPE Apollo 6000 DLC System ROM firmware prior to v1.26 - HPE ProLiant BL460c Gen10 Server Blade ROM firmware prior to v1.26 - HPE ProLiant DL20 Gen9 Server SPS Firmware prior to v4.01.04.054 - HPE ProLiant DL360 Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant DL380 Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant DL560 Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant DL580 Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant m710x Server Cartridge ROM firmware prior to v1.26 - HPE ProLiant ML30 Gen9 Server SPS Firmware prior to 4.01.04.054 - HPE ProLiant ML110 Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant ML350 Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant XL170r Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant XL190r Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant XL230k Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant XL450 Gen10 Server ROM firmware prior to v1.26 - HPE Synergy 660 Gen10 Compute Module ROM firmware prior to v1.26, SPS firmware prior to 04.00.04.28 - HPE Synergy 480 Gen10 Compute Module ROM firmware prior to v1.26, SPS firmware prior to 04.00.04.28 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2017-5706 7.4 CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) CVE-2017-5709 7.4 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N 5.6 (AV:L/AC:H/Au:N/C:C/I:C/A:N) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has provided the following response to resolve the vulnerabilities in SPS. HPE is working closely with Intel to ensure timely resolution of this issue on HPE systems. HPE will resolve this vulnerability in our servers in the following ways. * For customers that currently have impacted HPE ProLiant and Synergy servers at their locations, are available for download from HPEs support site. Customers should refer to the Customer Bulletin HPE Servers: * [Some Systems Using Certain Intel Processors Are Vulnerable to Local Denial of Service and Execution of Arbitrary Code for detailed instructions](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a0 036596en_us) HISTORY Version:1 (rev.1) - 21 November 2017 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBCAAGBQJaFEmSAAoJELXhAxt7SZaiDlYH+gOhwTGNWGwKgHM443u5FL7l lq4v46iIYbFDRVPt6Ffh+I1YdjvclJ/EsQsJQiCdRqdBwUVCm31aBsRPD/Xk+fbn rrSLw7b2Eqyxy+F1Xe5Uoxwy7sOg1mROL7oQmst19cuWUgH8XX899+UQ/At2ikiM PoZDIthRb2KjnvyG0uLCkomWBKGxsnBCkDWd8tXw9AmsYmAPXlPPTcHZHxeDyGpm A/z214HFWRDg/xUf36VHQ2vp5Bung4auFMnwYdVFYciQZAJHzB1rALkVIXDqdNIL R243Vf6tGN2vQzqxr5enb0Mi9TCvQ2uDMPPpzObfDKhnYVVIwOPvbshlDuCFD4E= =4PaY -----END PGP SIGNATURE-----
VAR-201711-0646 CVE-2017-5707 Intel Trusted Execution Engine Firmware Buffer error vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Multiple buffer overflows in kernel in Intel Trusted Execution Engine Firmware 3.0 allow attacker with local access to the system to execute arbitrary code. IntelTrustedExecutionEngineFirmware is a trusted execution engine firmware product. There are multiple local buffer overflow vulnerabilities in IntelTrustedExecutionEngine. Failed exploit attempts will likely result in denial-of-service conditions. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. The following products are affected: Intel 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
VAR-201711-0647 CVE-2017-5708 Intel Manageability Engine Firmware Vulnerabilities related to authorization, permissions, and access control CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Multiple privilege escalations in kernel in Intel Manageability Engine Firmware 11.0/11.5/11.6/11.7/11.10/11.20 allow unauthorized process to access privileged content via unspecified vector. Intel Manageability Engine Firmware Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. An attacker could exploit the vulnerability to access privileged content. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. kernel is one of the kernels. The following products and versions are affected: Intel Manageability Engine Firmware Firmware Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
VAR-201711-0648 CVE-2017-5709 Intel Server Platform Services Firmware Vulnerabilities in authorization, authority and access control CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Multiple privilege escalations in kernel in Intel Server Platform Services Firmware 4.0 allows unauthorized process to access privileged content via unspecified vector. IntelServerPlatformServicesFirmware is a server platform service program used in the CPU (Central Processing Unit). Multiple Oracle Server products are prone to multiple local security vulnerabilities. These vulnerabilities affect the following supported versions: 1.0 and 1.0.1. The program supports remote access and management of servers. kernel is one of the kernels. The following products are affected: Intel 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03798en_us SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: hpesbhf03798en_us Version: 1 HPESBHF03798 rev.1 - HPE Proliant Gen10 Servers, DL20 Gen9, ML30 Gen9 and Certain Apollo Servers Using Intel Server Platform Service (SPS) v4.0, Local Denial of Service and Execution of Arbitrary Code NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2017-11-21 Last Updated: 2017-11-21 Potential Security Impact: Local: Denial of Service (DoS), Execution of Arbitrary Code Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY A vulnerability in HPE certain Gen10 Servers, DL20 Gen9, ML30 Gen9 and certain Apollo servers with Intel Server Platform Service (SPS) v4.0 are vulnerable to local Denial of Service and execution of arbitrary code. **Note:** Intel has identified security vulnerabilities which could potentially place impacted platforms at risk. An issue impacts Intel Server Platform Service (SPS) v4.0 used in certain HPE servers. The SPS/ME firmware used in Intels architecture can be compromised with physical access such that non-authenticated code may be executed in the SPS environment outside of the visibility of the user and operating system administrator. - HPE Apollo 2000 System ROM firmware prior to v1.26 - HPE Apollo 4510 System ROM firmware prior to v1.26 - HPE Apollo 6000 DLC System ROM firmware prior to v1.26 - HPE ProLiant BL460c Gen10 Server Blade ROM firmware prior to v1.26 - HPE ProLiant DL20 Gen9 Server SPS Firmware prior to v4.01.04.054 - HPE ProLiant DL360 Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant DL380 Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant DL560 Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant DL580 Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant m710x Server Cartridge ROM firmware prior to v1.26 - HPE ProLiant ML30 Gen9 Server SPS Firmware prior to 4.01.04.054 - HPE ProLiant ML110 Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant ML350 Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant XL170r Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant XL190r Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant XL230k Gen10 Server ROM firmware prior to v1.26 - HPE ProLiant XL450 Gen10 Server ROM firmware prior to v1.26 - HPE Synergy 660 Gen10 Compute Module ROM firmware prior to v1.26, SPS firmware prior to 04.00.04.28 - HPE Synergy 480 Gen10 Compute Module ROM firmware prior to v1.26, SPS firmware prior to 04.00.04.28 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2017-5706 7.4 CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) CVE-2017-5709 7.4 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N 5.6 (AV:L/AC:H/Au:N/C:C/I:C/A:N) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has provided the following response to resolve the vulnerabilities in SPS. HPE is working closely with Intel to ensure timely resolution of this issue on HPE systems. HPE will resolve this vulnerability in our servers in the following ways. * For customers that currently have impacted HPE ProLiant and Synergy servers at their locations, are available for download from HPEs support site. Customers should refer to the Customer Bulletin HPE Servers: * [Some Systems Using Certain Intel Processors Are Vulnerable to Local Denial of Service and Execution of Arbitrary Code for detailed instructions](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a0 036596en_us) HISTORY Version:1 (rev.1) - 21 November 2017 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBCAAGBQJaFEmSAAoJELXhAxt7SZaiDlYH+gOhwTGNWGwKgHM443u5FL7l lq4v46iIYbFDRVPt6Ffh+I1YdjvclJ/EsQsJQiCdRqdBwUVCm31aBsRPD/Xk+fbn rrSLw7b2Eqyxy+F1Xe5Uoxwy7sOg1mROL7oQmst19cuWUgH8XX899+UQ/At2ikiM PoZDIthRb2KjnvyG0uLCkomWBKGxsnBCkDWd8tXw9AmsYmAPXlPPTcHZHxeDyGpm A/z214HFWRDg/xUf36VHQ2vp5Bung4auFMnwYdVFYciQZAJHzB1rALkVIXDqdNIL R243Vf6tGN2vQzqxr5enb0Mi9TCvQ2uDMPPpzObfDKhnYVVIwOPvbshlDuCFD4E= =4PaY -----END PGP SIGNATURE-----
VAR-201711-0649 CVE-2017-5710 Intel Trusted Execution Engine Firmware Vulnerabilities related to authorization, permissions, and access control CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Multiple privilege escalations in kernel in Intel Trusted Execution Engine Firmware 3.0 allows unauthorized process to access privileged content via unspecified vector. IntelTrustedExecutionEngineFirmware is a trusted execution engine firmware product. There are multiple local privilege elevation vulnerabilities in IntelTrustedExecutionEngine. An attacker could exploit the vulnerability to access privileged content. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. kernel is one of the kernels. The following products are affected: Intel 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
VAR-201711-0650 CVE-2017-5711 Intel Manageability Engine Firmware of Active Management Technology Buffer error vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. Failed exploit attempts will likely result in denial-of-service conditions. Intel Manageability Engine versions 8.x, 9.x, 10.x, 11.0,11.5,11.6,11.7,11.10, and 11.20 are vulnerable. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. Active Management Technology (AMT) is one of the active management components. The following products and versions are affected: Intel Manageability Engine Firmware Versions 8.x, 9.x, 10.x, 11.0, 11.5, 11.6, 11.7, 11.10, 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
VAR-201711-0651 CVE-2017-5712 Intel Manageability Engine Firmware of Active Management Technology Buffer error vulnerability CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. Failed exploits may result in denial-of-service conditions. Intel Manageability Engine versions 8.x, 9.x, 10.x, 11.0,11.5, 11.6, 11.7, 11.10, and 11.20 are vulnerable. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. Active Management Technology (AMT) is one of the active management components. The following products and firmware are affected: Intel Manageability Engine Firmware Version 8.x, Version 9.x, Version 10.x, Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; Intel 6th, 7th and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
VAR-201711-0521 CVE-2017-16902 Vonage VDV-23 Home router buffer error vulnerability

Related entries in the VARIoT exploits database: VAR-E-201711-0245
CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
On the Vonage VDV-23 115 3.2.11-0.9.40 home router, sending a long string of characters in the loginPassword and/or loginUsername field to goform/login causes the router to reboot. Vonage VDV-23 Home routers contain a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. VonageVDV-23115 is a routing repeater from Vonage Corporation of the United States. A security vulnerability exists in the Vonage VDV-231153.2.11-0.9.40 release
VAR-201712-0797 CVE-2017-15310 Huawei iReader Application input validation vulnerability CVSS V2: 5.8
CVSS V3: 6.5
Severity: MEDIUM
Huawei iReader app before 8.0.2.301 has an arbitrary file deletion vulnerability due to the lack of input validation. An attacker can exploit this vulnerability to delete specific files from the SD card. Huawei iReader The application contains an input validation vulnerability.Information may be tampered with. Huawei iReader is a built-in e-book reading application for Huawei mobile phones produced by China's Huawei (Huawei)
VAR-201712-0795 CVE-2017-15308 Huawei iReader Application input validation vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
Huawei iReader app before 8.0.2.301 has an input validation vulnerability due to insufficient validation on the URL used for loading network data. An attacker can control app access and load malicious websites created by the attacker, and the code in webpages would be loaded and run. Huawei iReader The application contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows local attackers to escalate privileges on vulnerable installations of Huawei Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of plugins. The issue results from the storage of plugins in an insecure location. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current user. Huawei iReader is a built-in e-book reading application for Huawei mobile phones produced by China's Huawei (Huawei)
VAR-201712-0796 CVE-2017-15309 Huawei iReader Application path traversal vulnerability CVSS V2: 5.8
CVSS V3: 7.1
Severity: HIGH
Huawei iReader app before 8.0.2.301 has a path traversal vulnerability due to insufficient validation on file storage paths. An attacker can exploit this vulnerability to store downloaded malicious files in an arbitrary directory. Huawei iReader The application contains a path traversal vulnerability.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of the onChapPack function. Huawei iReader is a built-in e-book reading application for Huawei mobile phones produced by China's Huawei (Huawei)
VAR-201711-1240 No CVE Tiandi Albert Announces Information Disclosure Vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Tiandi Weiye Technology Co., Ltd. is an Internet of Things company whose main business is the research and development, production and sales of video surveillance products. With "Horizon as the World" as its corporate mission, it is a national enterprise technology center and a national and local joint engineering laboratory. There is an information disclosure vulnerability in Tiandiweiye Network Camera, which is due to failure to properly control camera permissions. The attacker directly obtains the system username and password by sending a specific data packet.
VAR-201711-0280 CVE-2017-1000230 Snap7 Server Denial of service vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The Snap7 Server version 1.4.1 can be crashed when the ItemCount field of the ReadVar or WriteVar functions of the S7 protocol implementation in Snap7 are provided with unexpected input, thus resulting in denial of service attack. Snap7 The server contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Snap7 is an open source multi-platform Ethernet communications suite for local connectivity to PLCs. Snap7 Server is one of the server components. There is a security vulnerability in Snap7 Server version 1.4.1. An attacker could exploit the vulnerability to cause a denial of service (crash)