VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201804-0375 CVE-2017-14464 Allen Bradley Micrologix 1400 Series Access control vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability.Required Keyswitch State: REMOTE or PROG Associated Fault Code: 0001 Fault Type: Non-User Description: A fault state can be triggered by setting the NVRAM/memory module user program mismatch bit (S2:9) when a memory module is NOT installed. The AllenBradley Micrologix 1400 SeriesBFRN is a programmable logic controller from Rockwell Automation
VAR-201804-0374 CVE-2017-14463 Allen Bradley Micrologix 1400 Series Access control vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE or PROG Associated Fault Code: 0012 Fault Type: Non-User Description: A fault state can be triggered by overwriting the ladder logic data file (type 0x22 number 0x02) with null values. The AllenBradley Micrologix 1400 SeriesBFRN is a programmable logic controller from Rockwell Automation
VAR-201804-0382 CVE-2017-14471 Allen Bradley Micrologix 1400 Series B Access control vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE or PROG Associated Fault Codes: 0023, 002e, and 0037 Fault Type: Recoverable Description: The STI, EII, and HSC function files contain bits signifying whether or not a fault has occurred. Additionally there is a bit signaling the module to auto start. When these bits are set for any of the three modules and the device is moved into a run state, a fault is triggered. The AllenBradley Micrologix 1400 SeriesBFRN is a programmable logic controller from Rockwell Automation
VAR-201804-0380 CVE-2017-14469 Allen Bradley Micrologix 1400 Series Access control vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE or PROG Associated Fault Code: 0028 Fault Type: Non-User Description: Values 0x01 and 0x02 are invalid values for the user fault routine. By writing directly to the file it is possible to set these values. When this is done and the device is moved into a run state, a fault is triggered. NOTE: This is not possible through RSLogix. The AllenBradley Micrologix 1400 SeriesBFRN is a programmable logic controller from Rockwell Automation
VAR-201709-0657 CVE-2017-12249 Cisco Meeting Server Built in TURN Server configuration vulnerability CVSS V2: 9.0
CVSS V3: 9.1
Severity: CRITICAL
A vulnerability in the Traversal Using Relay NAT (TURN) server included with Cisco Meeting Server (CMS) could allow an authenticated, remote attacker to gain unauthenticated or unauthorized access to components of or sensitive information in an affected system. The vulnerability is due to an incorrect default configuration of the TURN server, which could expose internal interfaces and ports on the external interface of an affected system. An attacker could exploit this vulnerability by using a TURN server to perform an unauthorized connection to a Call Bridge, a Web Bridge, or a database cluster in an affected system, depending on the deployment model and CMS services in use. A successful exploit could allow the attacker to gain unauthenticated access to a Call Bridge or database cluster in an affected system or gain unauthorized access to sensitive meeting information in an affected system. To exploit this vulnerability, the attacker must have valid credentials for the TURN server of the affected system. This vulnerability affects Cisco Meeting Server (CMS) deployments that are running a CMS Software release prior to Release 2.0.16, 2.1.11, or 2.2.6. Cisco Bug IDs: CSCvf51127. Vendors have confirmed this vulnerability Bug ID CSCvf51127 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This may aid in further attacks
VAR-201709-0584 CVE-2017-14413 D-Link DIR-850L Cross-site scripting vulnerability in device firmware CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/wpsacts.php. D-Link DIR-850L The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-850LREV.A is a wireless router from D-Link. A remote attacker could exploit the vulnerability to steal authentication cookies by sending an \342\200\230action\342\200\231 parameter to the htdocs/web/wandetect.php file
VAR-201709-0585 CVE-2017-14414 D-Link DIR-850L Cross-site scripting vulnerability in device firmware CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/shareport.php. D-Link DIR-850L The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-850LREV.A is a wireless router from D-Link. A remote attacker could exploit the vulnerability to steal authentication cookies by sending an \342\200\230action\342\200\231 parameter to the htdocs/web/wandetect.php file
VAR-201709-0586 CVE-2017-14415 D-Link DIR-850L Cross-site scripting vulnerability in device firmware CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/sitesurvey.php. D-Link DIR-850L The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-850LREV.A is a wireless router from D-Link. A remote attacker could exploit the vulnerability to steal authentication cookies by sending an \342\200\230action\342\200\231 parameter to the htdocs/web/wandetect.php file
VAR-201709-0587 CVE-2017-14416 D-Link DIR-850L REV.A Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/wandetect.php. D-Link DIR-850L The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-850LREV.A is a wireless router from D-Link. A remote attacker could exploit the vulnerability to steal authentication cookies by sending an \342\200\230action\342\200\231 parameter to the htdocs/web/wandetect.php file
VAR-201709-0588 CVE-2017-14417 D-Link DIR-850L Vulnerability related to access control in device firmware CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
register_send.php on D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices does not require authentication, which can result in unintended enrollment in mydlink Cloud Services. D-Link DIR-850L There is an access control vulnerability in the device firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.B is a wireless router from D-Link. A security vulnerability exists in the register_send.php file in the D-LinkDIR-850LREV.B device using FW208WWb02 and previous firmware. The vulnerability stems from the program not requiring authentication. An attacker could exploit the vulnerability to gain access
VAR-201709-0589 CVE-2017-14418 D-Link DIR-850L Vulnerabilities related to certificate / password management in device firmware CVSS V2: 4.3
CVSS V3: 8.1
Severity: HIGH
The D-Link NPAPI extension, as used in conjunction with D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices, sends the cleartext admin password over the Internet as part of interaction with mydlink Cloud Services. D-Link DIR-850L The device firmware contains a vulnerability related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.B is a wireless router from D-Link. A security vulnerability exists in the D-Link NPAPI extension used in the D-LinkDIR-850LREV.B device using FW208WWb02 and previous firmware. An attacker could use this vulnerability to retrieve an administrator password
VAR-201709-0590 CVE-2017-14419 D-Link DIR-850L Vulnerability related to certificate validation in device firmware CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, participates in mydlink Cloud Services by establishing a TCP relay service for HTTP, even though a TCP relay service for HTTPS is also established. D-Link DIR-850L There is a certificate validation vulnerability in the device firmware.Information may be obtained. The D-LinkDIR-850L is a wireless router from D-Link. A security vulnerability exists in NPAPIextension in FW114WWb07_h2ab_beta1 and previous versions of D-LinkDIR-850L. A remote attacker can exploit this vulnerability to obtain information
VAR-201709-0599 CVE-2017-14428 D-Link DIR-850L Vulnerabilities related to authorization, authority, and access control in device firmware CVSS V2: 2.1
CVSS V3: 7.8
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/run/hostapd* permissions. D-Link DIR-850L Device firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the REV.B device using D-LinkDIR-850LREV.A and FW208WWb02 and previous firmware versions of FW114WWb07_h2ab_beta1 and previous firmware. An attacker could exploit this vulnerability to obtain a wireless password
VAR-201709-0601 CVE-2017-14430 D-Link DIR-850L Vulnerability related to input validation in device firmware CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices allow remote attackers to cause a denial of service (daemon crash) via crafted LAN traffic. D-Link DIR-850L There is an input validation vulnerability in the device firmware.Service operation interruption (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. There are security vulnerabilities in the REV.B devices of the D-LinkDIR-850LREV.A and FW208WWb02 and previous versions of firmware using FW114WWb07_h2ab_beta1 and previous firmware
VAR-201709-0591 CVE-2017-14420 D-Link DIR-850L Vulnerability related to certificate validation in device firmware CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. D-Link DIR-850L There is a certificate validation vulnerability in the device firmware.Information may be obtained. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the D-LinkDIR-850LREV.A using FW114WWb07_h2ab_beta1 and previous firmware and the D-LinkNPAPI extension used in the REV.B device using FW208WWb02 and previous firmware. The vulnerability stems from the program failing to verify the X of the SSL server. 509 certificate
VAR-201709-0593 CVE-2017-14422 D-Link DIR-850L Vulnerabilities related to the use of hard-coded credentials in device firmware CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices use the same hardcoded /etc/stunnel.key private key across different customers' installations, which allows remote attackers to defeat the HTTPS cryptographic protection mechanisms by leveraging knowledge of this key from another installation. D-Link DIR-850L Device firmware contains a vulnerability related to the use of hard-coded credentials.Information may be obtained. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. This vulnerability is caused by different users using the same hard-coded private key during installation ( /etc/stunnel.key). This vulnerability could be exploited by a remote attacker to compromise the HTTPS encryption protection mechanism. key (/etc/stunnel.key)
VAR-201709-0594 CVE-2017-14423 D-Link DIR-850L Vulnerabilities related to security functions in device firmware CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
htdocs/parentalcontrols/bind.php on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices does not prevent unauthenticated nonce-guessing attacks, which makes it easier for remote attackers to change the DNS configuration via a series of requests. D-Link DIR-850L The device firmware contains vulnerabilities related to security functions.Information may be tampered with. D-LinkDIR-850LREV.A is a wireless router from D-Link
VAR-201709-0595 CVE-2017-14424 D-Link DIR-850L Vulnerabilities related to authorization, authority, and access control in device firmware CVSS V2: 2.1
CVSS V3: 7.8
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/passwd permissions. D-Link DIR-850L Device firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the REV.B device using D-LinkDIR-850LREV.A and FW208WWb02 and previous firmware versions of FW114WWb07_h2ab_beta1 and previous firmware. An attacker could exploit the vulnerability to obtain a certificate
VAR-201709-0596 CVE-2017-14425 D-Link DIR-850L Vulnerabilities related to authorization, authority, and access control in device firmware CVSS V2: 2.1
CVSS V3: 7.8
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/etc/hnapasswd permissions. D-Link DIR-850L Device firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the REV.B device using D-LinkDIR-850LREV.A and FW208WWb02 and previous firmware versions of FW114WWb07_h2ab_beta1 and previous firmware. An attacker could use this vulnerability to retrieve a password
VAR-201709-0597 CVE-2017-14426 D-Link DIR-850L Vulnerabilities related to authorization, authority, and access control in device firmware CVSS V2: 2.1
CVSS V3: 7.8
Severity: HIGH
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0644 /var/etc/shadow (aka the /etc/shadow symlink target) permissions. D-Link DIR-850L Device firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the REV.B device using D-LinkDIR-850LREV.A and FW208WWb02 and previous firmware versions of FW114WWb07_h2ab_beta1 and previous firmware. An attacker could exploit this vulnerability to obtain a DES hash of an administrator user