VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201803-2358 No CVE Cross-Border Access Vulnerability in Zhejiang Dahua Play Library SDK (CNVD-2018-01919) CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products. The mpeg4dec.dll in the Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has an out-of-bounds access vulnerability. An attacker could use this vulnerability to cause a denial of service or process information leakage.
VAR-201803-2359 No CVE Cross-Border Access Vulnerability in Zhejiang Dahua Play Library SDK (CNVD-2018-01921) CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products. The mpeg4dec.dll in the Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has an out-of-bounds access vulnerability. An attacker could use this vulnerability to cause a denial of service or process information leakage.
VAR-201803-2351 No CVE Memory corruption vulnerability exists in Zhejiang Dahua Play Library SDK CVSS V2: 4.6
CVSS V3: -
Severity: MEDIUM
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products. Dhplay.dll in Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has a memory corruption vulnerability. An attacker can use this vulnerability to cause a denial of service attack or arbitrary code execution.
VAR-201803-2357 No CVE Denial of Service Vulnerability in Zhejiang Dahua Play Library SDK (CNVD-2018-01922) CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products. The dhplay.dll in the Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has a denial of service vulnerability. An attacker can use this vulnerability to cause a denial of service attack.
VAR-201803-2362 No CVE There is cross-border Access Vulnerability (CNVD-2018-01923) Zhejiang Dahua player SDK library CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products. The dhplay.dll in Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has an out-of-bounds access vulnerability. An attacker can use this vulnerability to cause a denial of service or information leakage.
VAR-201803-1847 CVE-2018-7227 Schneider Electric Pelco Sarix Professional Vulnerable to information disclosure CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow retrieving of specially crafted URLs without authentication that can reveal sensitive information to an attacker. Schneider Electric Pelco Sarix Professional Contains an information disclosure vulnerability.Information may be obtained. SchneiderElectricPelcoSarixProfessional is a video surveillance device from Schneider Electric, France. A security vulnerability exists in SchneiderElectricPelcoSarixProfessional with firmware prior to 3.25.67. An attacker could exploit this vulnerability to obtain sensitive information. Information obtained may aid in further attacks
VAR-201803-1812 CVE-2018-5500 plural F5 BIG-IP Product depletion vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
On F5 BIG-IP systems running 13.0.0, 12.1.0 - 12.1.3.1, or 11.6.1 - 11.6.2, every Multipath TCP (MCTCP) connection established leaks a small amount of memory. Virtual server using TCP profile with Multipath TCP (MCTCP) feature enabled will be affected by this issue. plural F5 BIG-IP The product is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. F5BIG-IP is an all-in-one network device that integrates network traffic management, application security management, load balancing and other functions. There is a security hole in F5BIG-IP. An attacker could exploit the vulnerability to cause a denial of service (out of memory). Multiple F5 BIG-IP Products is prone to a memory-corruption vulnerability. Attackers can exploit this issue to obtain sensitive information or crash the application resulting in a denial-of-service condition. A security vulnerability exists in F5 BIG-IP version 13.0.0, versions 12.1.0 through 12.1.3.1, and versions 11.6.1 through 11.6.2
VAR-201803-2083 CVE-2018-5455 Moxa OnCell G3100-HSPA Series Authentication Bypass Vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A Reliance on Cookies without Validation and Integrity Checking issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. The application allows a cookie parameter to consist of only digits, allowing an attacker to perform a brute force attack bypassing authentication and gaining access to device functions. Moxa OnCell G3100-HSPA There are authentication vulnerabilities in the series.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MoxaOnCellG3100-HSPA is an intelligent, feature-rich wireless communication platform that connects network devices and serial devices to cellular TCP/IP networks. Moxa OnCell G3100-HSPA Series is prone to multiple denial-of-service vulnerabilities and an authentication-bypass vulnerability. OnCell G3100-HSPA Series 1.4 Build 16062919 and prior are vulnerable. Moxa OnCell G3100-HSPA Series is the G3100 series gateway product of Moxa
VAR-201803-2081 CVE-2018-5453 Moxa OnCell G3100-HSPA Series Denial of service vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
An Improper Handling of Length Parameter Inconsistency issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker may be able to edit the element of an HTTP request, causing the device to become unavailable. Moxa OnCell G3100-HSPA The series contains a data processing vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. MoxaOnCellG3100-HSPA is an intelligent, feature-rich wireless communication platform that connects network devices and serial devices to cellular TCP/IP networks. Moxa OnCell G3100-HSPA Series is prone to multiple denial-of-service vulnerabilities and an authentication-bypass vulnerability. An attacker can exploit these issues to bypass authentication mechanism or to cause a denial-of-service condition; denying service to legitimate users. OnCell G3100-HSPA Series 1.4 Build 16062919 and prior are vulnerable. Moxa OnCell G3100-HSPA Series is the G3100 series gateway product of Moxa
VAR-201803-2078 CVE-2018-5449 Moxa OnCell G3100-HSPA Series Null Pointer Reference Denial of Service Vulnerability CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
A NULL Pointer Dereference issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. The application does not check for a NULL value, allowing for an attacker to perform a denial of service attack. MoxaOnCellG3100-HSPA is an intelligent, feature-rich wireless communication platform that connects network devices and serial devices to cellular TCP/IP networks. Moxa OnCell G3100-HSPA Series is prone to multiple denial-of-service vulnerabilities and an authentication-bypass vulnerability. An attacker can exploit these issues to bypass authentication mechanism or to cause a denial-of-service condition; denying service to legitimate users. OnCell G3100-HSPA Series 1.4 Build 16062919 and prior are vulnerable. Moxa OnCell G3100-HSPA Series is the G3100 series gateway product of Moxa
VAR-201803-1813 CVE-2018-5501 plural F5 BIG-IP Product resource exhaustion vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In some circumstances, on F5 BIG-IP systems running 13.0.0, 12.1.0 - 12.1.3.1, any 11.6.x or 11.5.x release, or 11.2.1, TCP DNS profile allows excessive buffering due to lack of flow control. plural F5 BIG-IP The product contains a resource exhaustion vulnerability.Denial of service (DoS) May be in a state. F5BIG-IP is an all-in-one network device that integrates network traffic management, application security management, load balancing and other functions. There is a security hole in F5BIG-IP. An attacker could exploit the vulnerability with a TCPDNS profile to cause computer performance degradation or a denial of service. Multiple F5 BIG-IP Products is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to crash the application resulting in denial-of-service conditions. A security vulnerability exists in the F5 BIG-IP
VAR-201803-1076 CVE-2017-6154 BIG-IP ASM Input validation vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
On F5 BIG-IP systems running 13.0.0, 12.1.0 - 12.1.3.1, or 11.6.1 - 11.6.2, the BIG-IP ASM bd daemon may core dump memory under some circumstances when processing undisclosed types of data on systems with 48 or more CPU cores. BIG-IP ASM Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5BIG-IPASM (ApplicationSecurityManager) is a Web Application Firewall (WAF) from F5 Corporation of the United States that provides secure remote access, secure email protection, and simplified Web access control while enhancing network and application performance. There is a security hole in F5BIG-IPASM. An attacker could exploit this vulnerability to interrupt traffic processing and perform failover. F5 BIG-IP ASM is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to crash the application resulting in denial-of-service conditions
VAR-201803-2348 No CVE Denial of Service Vulnerability in Zhejiang Dahua Play Library SDK CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products. There is a denial of service vulnerability in dhplay.dll in the Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version. An attacker can use this vulnerability to cause denial of service access.
VAR-201803-2349 No CVE Directory traversal vulnerability exists along wireless network routing CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shun network wireless routing is a management tool used to prevent idlers from getting online when WiFi sharing. A directory traversal vulnerability exists in the wireless routing along the network. An attacker can use this vulnerability to perform unauthorized operations on the wireless routing along the network.
VAR-201803-2360 No CVE Cross-Border Access Vulnerability in Zhejiang Dahua Play Library SDK CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products. The mpeg4dec.dll in the Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has an out-of-bounds access vulnerability. An attacker can use this vulnerability to cause a denial of service or information leakage.
VAR-201803-1845 CVE-2018-7238 Schneider Electric Pelco Sarix Professional Buffer error vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A buffer overflow vulnerability exist in the web-based GUI of Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow an unauthenticated, remote attacker to execute arbitrary code. Schneider Electric Pelco Sarix Professional Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SchneiderElectricPelcoSarixProfessional is a video surveillance device from Schneider Electric, France
VAR-201803-1844 CVE-2018-7237 Schneider Electric Pelco Sarix Professional Input validation vulnerability CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow a remote attacker to delete arbitrary system file due to lack of validation of the /login/bin/set_param to the file name with the value of 'system.delete.sd_file'. Schneider Electric Pelco Sarix Professional Contains an input validation vulnerability.Information may be tampered with. SchneiderElectricPelcoSarixProfessional is a video surveillance device from Schneider Electric, France. A security vulnerability exists in SchneiderElectricPelcoSarixProfessional with firmware prior to 3.29.67. The vulnerability stems from the failure of the /login/bin/set_param program to check the file name when processing the system.delete.sd_file parameter. A remote attacker could exploit this vulnerability to remove any system files
VAR-201803-1841 CVE-2018-7234 Schneider Electric Pelco Sarix Professional Vulnerabilities related to certificate validation CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow arbitrary system file download due to lack of validation of SSL certificate. Schneider Electric Pelco Sarix Professional Contains a certificate validation vulnerability.Information may be obtained. SchneiderElectricPelcoSarixProfessional is a video surveillance device from Schneider Electric, France. An attacker could exploit this vulnerability to download any system files
VAR-201803-1842 CVE-2018-7235 Schneider Electric Pelco Sarix Professional Input validation vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow arbitrary system file download due to lack of validation of the shell meta characters with the value of 'system.download.sd_file'. Schneider Electric Pelco Sarix Professional Contains an input validation vulnerability.Information may be obtained. SchneiderElectricPelcoSarixProfessional is a video surveillance device from Schneider Electric, France. An attacker could exploit this vulnerability to download arbitrary files
VAR-201803-1042 CVE-2017-17227 Huawei Mate Smartphone vulnerabilities related to out-of-bounds reading CVSS V2: 9.3
CVSS V3: 7.8
Severity: HIGH
GPU driver in Huawei Mate 10 smart phones with the versions before ALP-L09 8.0.0.120(C212); The versions before ALP-L09 8.0.0.127(C900); The versions before ALP-L09 8.0.0.128(402/C02/C109/C346/C432/C652) has a out-of-bounds memory access vulnerability due to the input parameters validation. An attacker tricks a user into installing a malicious application on the smart phone, and the application can call the driver with special parameter and cause accessing out-of-bounds memory. Successful exploit may result in phone crash or arbitrary code execution. Huawei Mate Smartphone contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. HuaweiMate10 is a smartphone from China's Huawei company