VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201704-0739 CVE-2017-2319 Juniper Networks NorthStar Controller Vulnerabilities related to authorization, authority, and access control in applications CVSS V2: 7.5
CVSS V3: 8.3
Severity: HIGH
A vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow a malicious attacker to compromise the systems confidentiality or integrity without authentication, leading to managed systems being compromised or services being denied to authentic end users and systems as a result. Juniper Networks NorthStar Controller Applications have vulnerabilities related to authorization, permissions, and access control.Attackers can obtain information, falsify information, and cause denial of service (DoS) An attack may be carried out. Juniper NorthStar Controller Application is prone to unspecified authentication bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks. Juniper NorthStar Controller Application before version 2.1.0 Service Pack 1 are vulnerable. The controller optimizes a service provider's transport network by establishing open industry-standard protocols. An attacker could exploit this vulnerability to take control of the management system or cause a denial of service
VAR-201704-0898 CVE-2017-2149 Multiple installers of Toshiba memory card related software may insecurely load Dynamic Link Libraries

Related entries in the VARIoT exploits database: VAR-E-201704-0410
CVSS V2: 9.3
CVSS V3: 8.8
Severity: HIGH
Untrusted search path vulnerability in installers of the software for SDHC/SDXC Memory Card with embedded NFC functionality Software Update Tool V1.00.03 and earlier, SDHC Memory Card with embedded wireless LAN functionality FlashAir Configuration Software V3.0.2 and earlier, SDHC Memory Card with embedded wireless LAN functionality FlashAir Software Update tool (SD-WE series<W-03>) V3.00.01, SDHC Memory Card with embedded wireless LAN functionality FlashAir Software Update tool (SD-WD/WC series<W-02>) V2.00.03 and earlier, SDHC Memory Card with embedded wireless LAN functionality FlashAir Software Update tool (SD-WB/WL series) V1.00.04 and earlier, SDHC Memory Card with embedded TransferJet functionality Configuration Software V1.02 and earlier, SDHC Memory Card with embedded TransferJet functionality Software Update tool V1.00.06 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory. Multiple installers of Toshiba memory card related software contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Yuji Tounai of NTT Communications Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Arbitrary code may be executed with the privilege of the user invoking the installer. Toshiba SDHC and SDXC are both memory cards from Toshiba Corporation of Japan. A remote attacker can exploit this vulnerability to gain access. A remote attacker can leverage this issue to execute arbitrary code in the context of the affected application
VAR-201704-0738 CVE-2017-2318 Juniper Networks NorthStar Controller Application log file read vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
A vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an authenticated malicious user to read log files which will compromise the integrity of the system, or provide elevation of privileges. Juniper NorthStar Controller Application is prone to a remote privilege-escalation vulnerability. An attacker can exploit this vulnerability to gain elevated privileges. Juniper NorthStar Controller Application before version 2.1.0 Service Pack 1 are vulnerable. The controller optimizes a service provider's transport network by establishing open industry-standard protocols
VAR-201704-0310 CVE-2016-1713 Vtiger CRM of modules/Settings/Vtiger/actions/CompanyDetailsSave.php Vulnerable to arbitrary code execution

Related entries in the VARIoT exploits database: VAR-E-201509-0122, VAR-E-201509-0123, VAR-E-201509-0121
CVSS V2: 8.5
CVSS V3: 7.3
Severity: HIGH
Unrestricted file upload vulnerability in the Settings_Vtiger_CompanyDetailsSave_Action class in modules/Settings/Vtiger/actions/CompanyDetailsSave.php in Vtiger CRM 6.4.0 allows remote authenticated users to execute arbitrary code by uploading a crafted image file with an executable extension, then accessing it via a direct request to the file in test/logo/. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6000. Vtiger CRM is a customer relationship management system (CRM) based on SugarCRM developed by American Vtiger Company. The management system provides functions such as management, collection, and analysis of customer information
VAR-201704-1541 CVE-2017-7456 Moxa MXView Service disruption in (DoS) Vulnerabilities

Related entries in the VARIoT exploits database: VAR-E-201704-0047
CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Moxa MXView 2.8 allows remote attackers to cause a Denial of Service by sending overly long junk payload for the MXView client login credentials. Moxa MXView is a network management software for Moxa's configuration, monitoring and diagnostics of network devices in Industrial Ethernet. A security vulnerability exists in Moxa's MXView version 2.8. A remote attacker could exploit the vulnerability to cause a denial of service
VAR-201704-1540 CVE-2017-7455 Moxa MXView In Web Server private key file read vulnerability

Related entries in the VARIoT exploits database: VAR-E-201704-0497
CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Moxa MXView 2.8 allows remote attackers to read web server's private key file, no access control. Moxa MXView is a network management software for Moxa's configuration, monitoring and diagnostics of network devices in Industrial Ethernet. A security vulnerability exists in Moxa's MXView version 2.8
VAR-201704-1542 CVE-2017-7457 Moxa MX AOPC-Server XML External entity injection vulnerability CVSS V2: 1.9
CVSS V3: 5.0
Severity: MEDIUM
XML External Entity via ".AOP" files used by Moxa MX-AOPC Server 1.5 result in remote file disclosure. The Moxa MX-AOPC UA kit is an OPC UA server for industrial automation that supports push-pull communication. Allows local users to open specially crafted malicious MX-AOPC server file types. MX-AOPC UA SERVER is a set of automated software solutions from Moxa to help users realize seamless SCADA equipment data management
VAR-201704-0928 CVE-2017-2148 WN-AC1167GR vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Cross-site scripting vulnerability in WN-AC1167GR firmware version 1.04 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors. WN-AC1167GR provided by I-O DATA DEVICE, INC. is a wireless LAN router. WN-AC1167GR contains a stored cross-site scripting vulnerability (CWE-79). Satoshi Ogawa of Mitsui Bussan Secure Directions,Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user accesses a malicious URL while logged in, an arbitrary script may be executed on the user's web browser. I-O DATA WN-AC1167GR is prone to an unspecified cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. IO DATA WN-AC1167GR is a wireless router produced by Japan IO DATA DEVICE company
VAR-201704-0226 CVE-2015-8109 Lenovo System Update Vulnerabilities related to certificate and password management CVSS V2: 6.9
CVSS V3: 7.0
Severity: HIGH
Lenovo System Update (formerly ThinkVantage System Update) before 5.07.0019 allows local users to gain privileges by making a prediction of tvsu_tmp_xxxxxXXXXX account credentials that requires knowledge of the time that this account was created, aka a "temporary administrator account vulnerability.". Lenovo System Update ( Old ThinkVantage System Update) Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. Lenovo System Update is prone to a local privilege-escalation vulnerability. A local attacker can exploit this vulnerability to gain Administrator or SYSTEM level privileges. Versions prior to Lenovo System Update 5.07.0019 are vulnerable. Lenovo System Update (formerly known as ThinkVantage System Update) is a set of system automatic update tools provided by China Lenovo (Lenovo), which includes device driver updates, Windows system patch updates, etc
VAR-201704-0752 CVE-2017-2332 Juniper Networks NorthStar Controller Authentication vulnerabilities in applications CVSS V2: 9.3
CVSS V3: 8.8
Severity: HIGH
An insufficient authentication vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow a malicious, network based, unauthenticated attacker to perform privileged actions to gain complete control over the environment. Juniper NorthStar Controller Application is prone to a remote privilege-escalation vulnerability. An attacker can exploit this vulnerability to gain elevated privileges. The controller optimizes a service provider's transport network by establishing open industry-standard protocols
VAR-201704-0748 CVE-2017-2328 Juniper Networks NorthStar Controller Application elevation of vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
An information leak vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an unprivileged, authenticated, user to elevate their permissions through reading unprivileged information stored in the NorthStar controller. JuniperNetworksNorthStarControllerApplication is a traffic planning controller from Juniper Networks. The controller optimizes the service provider's transport network by establishing an open industry standard protocol. An information disclosure vulnerability exists in versions prior to JuniperNetworksNorthStarControllerApplication2.1.0ServicePack1. A local attacker can exploit this vulnerability to obtain sensitive information. Juniper NorthStar Controller Application is prone to a unspecified local information-disclosure vulnerability
VAR-201704-0753 CVE-2017-2333 Juniper Networks NorthStar Controller Service disruption in applications (DoS) Vulnerabilities CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
A persistent denial of service vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow a malicious, network-based, authenticated attacker to consume enough system resources to cause a persistent denial of service by visiting certain specific URLs on the server. JuniperNetworksNorthStarControllerApplication is a traffic planning controller from Juniper Networks. The controller optimizes the service provider's transport network by establishing an open industry standard protocol. A denial of service vulnerability exists in versions prior to JuniperNetworksNorthStarControllerApplication2.1.0ServicePack1
VAR-201704-1017 CVE-2017-6037 Wecon Technologies LEVI Studio HMI Editor Heap Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: 8.8
Severity: HIGH
A Heap-Based Buffer Overflow issue was discovered in Wecon Technologies LEVI Studio HMI Editor before 1.8.1. This vulnerability causes a buffer overflow when a maliciously crafted project file is run by the system. 1. A stack-based buffer-overflow vulnerability 2. Failed exploit attempts will likely cause denial-of-service conditions
VAR-201704-1016 CVE-2017-6035 Wecon Technologies LEVI Studio HMI Editor Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: 8.8
Severity: HIGH
A Stack-Based Buffer Overflow issue was discovered in Wecon Technologies LEVI Studio HMI Editor before 1.8.1. This vulnerability causes a buffer overflow, which could result in denial of service when a malicious project file is run on the system. WECON products are widely used in machinery, metallurgy, chemical, petroleum and other industries. An attacker could exploit the vulnerability to execute arbitrary code in the context of the user running the affected application. 1. A stack-based buffer-overflow vulnerability 2. Failed exploit attempts will likely cause denial-of-service conditions
VAR-201705-2404 CVE-2016-0004 A variety of Samsung mobile security bypass vulnerabilities CVSS V2: 4.6
CVSS V3: -
Severity: MEDIUM
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none. SamsungSM-G920F (GalaxyS6) and so on are all smartphones released by South Korea's Samsung. There are security bypass vulnerabilities in several Samsung phones. An attacker could use the vulnerability to make a call, send a text message, or post a command. Multiple Samsung Galaxy products are prone to a security-bypass vulnerability. An attacker may exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Samsung Galaxy S4 through S6 devices are vulnerable
VAR-201704-0750 CVE-2017-2330 Juniper Networks NorthStar Controller Application management resource management vulnerability CVSS V2: 4.9
CVSS V3: 6.2
Severity: MEDIUM
A denial of service vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an unauthenticated, local user, to create a fork bomb scenario, also known as a rabbit virus, or wabbit, which will create processes that replicate themselves, until all resources are consumed on the system, leading to a denial of service to the entire system until it is restarted. Continued attacks by an unauthenticated, local user, can lead to persistent denials of services. Juniper Networks NorthStar Controller The application contains a resource management vulnerability.Unauthorized local user disrupts service operation (DoS) An attack may be carried out. JuniperNetworksNorthStarControllerApplication is a traffic planning controller from Juniper Networks. The controller optimizes the service provider's transport network by establishing an open industry standard protocol. A denial of service vulnerability exists in versions prior to JuniperNetworksNorthStarControllerApplication2.1.0ServicePack1. A local attacker can exploit this vulnerability to cause a denial of service
VAR-201704-0106 CVE-2015-8780 Samsung wssyncmlnps In Kies Vulnerability that allows directory traversal in restore CVSS V2: 6.9
CVSS V3: 6.4
Severity: MEDIUM
Samsung wssyncmlnps before 2015-10-31 allows directory traversal in a Kies restore, aka ZipFury. Samsungwssyncmlnps is a software update service in Samsung's smartphones in South Korea. Kiesrestore is one of the system recovery features. An attacker could exploit this vulnerability to write to any file
VAR-201704-0029 CVE-2016-4032 plural Samsung In the device Android Vulnerability to change settings CVSS V2: 2.1
CVSS V3: 4.6
Severity: MEDIUM
Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices do not block AT+USBDEBUG and AT+WIFIVALUE, which allows attackers to modify Android settings by leveraging AT access, aka SVE-2016-5301. Vendors have confirmed this vulnerability SVE-2016-5301 It is released as.By the attacker, AT By using access to AT A command may be sent. SamsungSM-G920F (GalaxyS6) and so on are all smartphones released by South Korea's Samsung. There are security bypass vulnerabilities in several Samsung phones. Multiple Samsung Galaxy products are prone to a security-bypass vulnerability. An attacker may exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks
VAR-201704-0964 CVE-2016-8712 Moxa AWK-3131A Wireless AP Session expiration vulnerability CVSS V2: 4.3
CVSS V3: 8.1
Severity: HIGH
An exploitable nonce reuse vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless AP running firmware 1.1. The device uses one nonce for all session authentication requests and only changes the nonce if the web application has been idle for 300 seconds. Moxa AWK-3131A Wireless AP Contains a session expiration vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. Moxa AWK-3131A Wireless Access Point is a wireless switch made by Moxa. Web Application is one of the network application modules. An attacker could exploit this vulnerability to gain access to a session token and use the token to log in
VAR-201704-0968 CVE-2016-8720 Moxa AWK-3131A Wireless AP Injection vulnerability CVSS V2: 4.3
CVSS V3: 4.3
Severity: MEDIUM
An exploitable HTTP Header Injection vulnerability exists in the Web Application functionality of the Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted HTTP request can inject a payload in the bkpath parameter which will be copied in to Location header of the HTTP response. Moxa AWK-3131A Wireless AP Contains an injection vulnerability.Information may be tampered with. Moxa AWK-3131A Wireless Access Point is a wireless switch made by Moxa. Web Application is one of the network application modules