VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201712-0196 CVE-2017-15889 Synology DiskStation Manager Command injection vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Command injection vulnerability in smart.cgi in Synology DiskStation Manager (DSM) before 5.2-5967-5 allows remote authenticated users to execute arbitrary commands via disk field. Synology DiskStation Manager (DSM) is an operating system developed by Synology for network storage servers (NAS). The operating system can manage data, documents, photos, music and other information. The smart.cgi file in versions earlier than Synology DSM 5.2-5967-5 has a command injection vulnerability
VAR-201712-0195 CVE-2017-15886 Synology Chat Server-side request forgery vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Server-side request forgery (SSRF) vulnerability in Link Preview in Synology Chat before 2.0.0-1124 allows remote authenticated users to download arbitrary local files via a crafted URI. Synology Chat Contains a server-side request forgery vulnerability.Information may be obtained. Synology Chat is an instant chat tool developed by Synology. Link Preview is one of the link preview components
VAR-201711-0208 CVE-2017-15887 Synology CardDAV Server Vulnerabilities related to certificate and password management CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
An improper restriction of excessive authentication attempts vulnerability in /principals in Synology CardDAV Server before 6.0.7-0085 allows remote attackers to obtain user credentials via a brute-force attack. Synology CardDAV Server Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Synology CardDAV Server is an application from Synology for synchronizing contacts. There is a security vulnerability in /principals in Synology CardDAV Server versions earlier than 6.0.7-0085. The vulnerability is due to the fact that the program does not limit the number of authentication times
VAR-201710-0499 CVE-2017-15888 Synology Audio Station Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in Custom Internet Radio List in Synology Audio Station before 6.3.0-3260 allows remote authenticated attackers to inject arbitrary web script or HTML via the NAME parameter. Synology Audio Station Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Synology Audio Station is an audio manager from Synology
VAR-201710-1446 No CVE Xerox Printers Certification Bypass Vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
XeroxPrinters is a Fuji Xerox (China) Co., Ltd. printer and MFP for SMEs and individual families. XeroxPrinters has a certification bypass vulnerability. An attacker exploits a vulnerability to enforce authentication.
VAR-201710-0735 CVE-2017-3771 Lenovo E95 and ThinkCentre M710s/M710t Vulnerabilities related to security functions CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
System boot process is not adequately secured In Lenovo E95 and ThinkCentre M710s/M710t because systems were shipped from factory without completing BIOS/UEFI initialization process. Lenovo E95 , ThinkCentre M710s and M710t Contains vulnerabilities related to security features.Information may be tampered with. LenovoE95 and ThinkCentreM710s/M710t are desktop computers of Lenovo China. An attacker could exploit this vulnerability to run a boot loader at system startup, reducing the protection of rootkits
VAR-201710-1067 CVE-2017-6159 plural F5 BIG-IP Resource management vulnerabilities in products CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM, Websafe software version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1 are vulnerable to a denial of service attack when the MPTCP option is enabled on a virtual server. Data plane is vulnerable when using the MPTCP option of a TCP profile. There is no control plane exposure. An attacker may be able to disrupt services by causing TMM to restart hence temporarily failing to process traffic. plural F5 BIG-IP The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP products are prone to a denial-of-service vulnerability. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. LTM is a local traffic manager; APM is a solution that provides secure unified access to business-critical applications and networks. Traffic Management Microkernel (TMM) is one of the service processes that performs traffic management. The following products and versions are affected: F5 BIG-IP LTM Version 12.0.0 through 12.1.2, Version 11.6.0 through Version 11.6.1; BIG-IP AAM Version 12.0.0 through Version 12.1.2, Version 11.6.0 to 11.6.1; BIG-IP AFM 12.0.0 to 12.1.2, 11.6.0 to 11.6.1; BIG-IP Analytics 12.0.0 to 12.1.2, 11.6.0 to 11.6 .1 version; BIG-IP APM version 12.0.0 through 12.1.2, version 11.6.0 through version 11.6.1; BIG-IP ASM version 12.0.0 through version 12.1.2, version 11.6.0 through 11.6.1 Versions; BIG-IP DNS version 12.0.0 to 12.1.2; BIG-IP GTM version 11.6.0 to 11.6.1; BIG-IP Link Controller version 12.0.0 to 12.1.2, 11.6.0 to Version 11.6.1; BIG-IP PEM Version 12.0.0 through Version 12.1.2, Version 11.6.0 through Version 11.6.1; BIG-IP WebSafe Version 12.0.0 through Version 12.1.2, Version 11.6.0 through Version 11.6. 1 version
VAR-201710-1313 CVE-2017-6161 plural F5 BIG-IP Product depletion vulnerability CVSS V2: 2.9
CVSS V3: 5.3
Severity: MEDIUM
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator software version 12.0.0 - 12.1.2, 11.6.0 - 11.6.1, 11.4.0 - 11.5.4, 11.2.1, when ConfigSync is configured, attackers on adjacent networks may be able to bypass the TLS protections usually used to encrypted and authenticate connections to mcpd. This vulnerability may allow remote attackers to cause a denial-of-service (DoS) attack via resource exhaustion. plural F5 BIG-IP The product is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP Products are prone to a security-bypass vulnerability. Successfully exploiting this issue may allow attackers to perform unauthorized actions. This may lead to other attacks. F5 BIG-IP LTM, etc. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager
VAR-201710-1314 CVE-2017-6162 plural F5 BIG-IP Product buffer error vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, Websafe software version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4, 11.2.1, in some cases TMM may crash when processing TCP traffic. This vulnerability affects TMM via a virtual server configured with TCP profile. Traffic processing is disrupted while Traffic Management Microkernel (TMM) restarts. If the affected BIG-IP system is configured to be part of a device group, it will trigger a failover to the peer device. plural F5 BIG-IP The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP products are prone to a denial-of-service vulnerability. A remote attacker can exploit this issue to cause the service to restart resulting in a denial-of-service condition. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. LTM is a local traffic manager; APM is a solution that provides secure unified access to business-critical applications and networks. The following products and versions are affected: BIG-IP LTM version 12.0.0 to version 12.1.2, version 11.6.0 to version 11.6.12, version 11.4.1 to version 11.5.42, version 11.2.1; BIG-IP Analytics 12.0.0 to 12.1.2, 11.6.0 to 11.6.12, 11.4.1 to 11.5.42, 11.2.1; BIG-IP APM 12.0.0 to 12.1.2, 11.6 .0 to 11.6.12, 11.4.1 to 11.5.42, 11.2.1; BIG-IP ASM 12.0.0 to 12.1.2, 11.6.0 to 11.6.12, 11.4. 1 to 11.5.42, 11.2.1; BIG-IP Link Controller 12.0.0 to 12.1.2, 11.6.0 to 11.6.12, 11.4.1 to 11.5.42, 11.2. 1 version; BIG-IP AAM version 12.0.0 to 12.1.2, 11.6.0 to 11.6.12, 11.4.1 to 11.5.42; BIG-IP AFM version 12.0.0 to 12.1.2 , version 11.6.0 to version 11.6.12, version 11.4.1 to version 11.5.42; BIG-IP PEM version 12.0.0 to version 12.1.2, version 11.6.0 to version 11.6.12, version 11.4.1 to Version 11.5.42; BIG-IP DNS versions 12.0.0 through 12.1.2; BIG-IP Edge Gateway 11.2
VAR-201710-1315 CVE-2017-6163 plural F5 BIG-IP Product buffer error vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, PSM software version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4, when a virtual server uses the standard configuration of HTTP/2 or SPDY profile with Client SSL profile, and the client initiates a number of concurrent streams beyond the advertised limit can cause a disruption of service. Remote client initiating stream beyond the advertised limit can cause a disruption of service. The Traffic Management Microkernel (TMM) data plane is exposed to this issue; the control plane is not exposed. plural F5 BIG-IP The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP products are prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. F5 BIG-IP LTM is a local traffic manager; BIG-IP AAM is an application acceleration manager. The following products and versions are affected: F5 BIG-IP LTM version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4; BIG-IP AAM version 12.0.0 to version 12.1.2, version 11.6.0 to version 11.6.1, version 11.4.0 to version 11.5.4; BIG-IP AFM version 12.0.0 to version 12.1.2, version 11.6.0 to version 11.6.1, 11.4.0 to 11.5.4; BIG-IP APM 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4; BIG-IP ASM 12.0. 0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4; BIG-IP Link Controller 12.0.0 to 12.1.2, 11.6.0 to 11.6. 1 release, 11.4.0 to 11.5.4 release; BIG-IP PEM release 12.0.0 to 12.1.2 release, 11.6.0 release to 11.6.1 release, 11.4.0 release to 11.5.4 release; BIG-IP PSM version 11.4.0 to version 11.4.1
VAR-201710-1068 CVE-2017-6160 F5 BIG-IP AAM and PEM Vulnerabilities in resource management CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In F5 BIG-IP AAM and PEM software version 12.0.0 to 12.1.1, 11.6.0 to 11.6.1, 11.4.1 to 11.5.4, a remote attacker may create maliciously crafted HTTP request to cause Traffic Management Microkernel (TMM) to restart and temporarily fail to process traffic. This issue is exposed on virtual servers using a Policy Enforcement profile or a Web Acceleration profile. Systems that do not have BIG-IP AAM module provisioned are not vulnerable. The Traffic Management Microkernel (TMM) may restart and temporarily fail to process traffic. Systems that do not have BIG-IP AAM or PEM module provisioned are not vulnerable. F5 BIG-IP AAM and PEM Contains a resource management vulnerability.Denial of service (DoS) May be in a state. Multiple F5 BIG-IP products are prone to a denial-of-service vulnerability. A remote attacker can exploit this issue to cause the service to restart resulting in a denial-of-service condition. F5 BIG-IP AAM is an application acceleration manager. PEM is a policy enforcement manager. F5 BIG-IP AAM and PEM have security vulnerabilities. The following products and versions are affected: F5 BIG-IP AAM Version 12.0.0 through 12.1.1, Version 11.6.0 through Version 11.6.1, Version 11.4.1 through Version 11.5.4; BIG-IP PEM Version 12.0.0 to version 12.1.1, version 11.6.0 to version 11.6.1, version 11.4.1 to version 11.5.4
VAR-201710-0498 CVE-2017-15885 Axis 2100 Network Camera Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Reflected XSS in the web administration portal on the Axis 2100 Network Camera 2.03 allows an attacker to execute arbitrary JavaScript via the conf_Layout_OwnTitle parameter to view/view.shtml. NOTE: this might overlap CVE-2007-5214. Axis 2100 Network Camera Contains a cross-site scripting vulnerability. The problem is CVE-2007-5214 And may overlap.Information may be obtained and information may be altered. The Axis2100NetworkCamera is a wireless camera product from Axis, Sweden. Webadministrationportal is one of the web management pages
VAR-201712-1083 CVE-2017-6679 Cisco Umbrella Vulnerabilities related to security functions in virtual appliances CVSS V2: 6.0
CVSS V3: 6.4
Severity: MEDIUM
The Cisco Umbrella Virtual Appliance Version 2.0.3 and prior contained an undocumented encrypted remote support tunnel (SSH) which auto initiated from the customer's appliance to Cisco's SSH Hubs in the Umbrella datacenters. These tunnels were primarily leveraged for remote support and allowed for authorized/authenticated personnel from the Cisco Umbrella team to access the appliance remotely and obtain full control without explicit customer approval. To address this vulnerability, the Umbrella Virtual Appliance version 2.1.0 now requires explicit customer approval before an SSH tunnel from the VA to the Cisco terminating server can be established. Cisco Umbrella Virtual appliances contain vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscoUmbrellaVirtualAppliance is a cloud-based secure Internet gateway device from Cisco. A security vulnerability exists in Cisco Umbrella VirtualAppliance 2.0.3 and earlier. This vulnerability could be exploited by a remote attacker to gain access to the device and to fully control the device. This may lead to further attacks. Timeline December 22, 2015 - Notified OpenDNS via security@opendns.com December 22, 2015 - OpenDNS responded stating that they will investigate January 4, 2016 - Asked for an update on their investigation January 11, 2016 - OpenDNS said they are working through a number of options to resolve the issue February 2, 2016 - OpenDNS advised they've shortlisted a couple of solutions and will provide another update in a week or so February 17, 2016 - OpenDNS said they would like to schedule a call to discuss February 24, 2016 - Had a call with OpenDNS to discuss possible solutions April 22, 2016 - Asked for an update on the progress of the fix May 3, 2016 - Asked for an update on the progress of the fix July 27, 2016 - Sent the vulnerability details to the Cisco PSIRT team July 29, 2016 - Cisco assigned a case number and asked to schedule a call to discuss August 17, 2016 - Had a call with the Cisco PSIRT team to discuss possible solutions September 26, 2016 - Asked for an update on the progress of the fix October 6, 2016 - Cisco provided a status update December 14, 2016 - Asked for an update on the progress of the fix December 19, 2016 - Cisco provided a status update January 10, 2017 - Asked for an update on the progress of the fix January 10, 2017 - Cisco provided a status update May 26, 2017 - Cisco assigned CVE-2017-6679 and advised that the issue would be made public in the next week June 2, 2017 - Cisco asked to move the disclosure date to August 31, 2017 August 30, 2017 - Cisco released virtual appliance version 2.1.0 which resolves this vulnerability by removing the undocumented reverse SSH tunnel September 21, 2017 - Cisco published a security advisory to document this issue Solution Upgrade to virtual appliance 2.1.0 or later https://support.umbrella.com/hc/en-us/articles/115004752143-Virtual-Appliance-Vulnerability-due-to-always-on-SSH-Tunnel-RESOLVED-2017-09-15 CVE-ID: CVE-2017-6679
VAR-201801-0535 CVE-2017-15653 ASUSWRT Session expiration vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Improper administrator IP validation after his login in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allows an unauthorized user to execute any action knowing administrator session token by using a specific User-Agent string. ASUSWRT Contains a session expiration vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUSWRT is the unified firmware used by ASUS in its latest routers and is the web-based graphical user interface of the ASUS router. The HTTPd server in Asusasuswrt 3.0.0.4.380.7743 and earlier has a login user IP verification vulnerability. An attacker who knows the session token can exploit the vulnerability to bypass the IP authentication mechanism and perform any action by sending a request with a special useragent. HTTPd server is one of the HTTP servers
VAR-201801-0536 CVE-2017-15654 Asus asuswrt Access control vulnerability CVSS V2: 7.6
CVSS V3: 8.3
Severity: HIGH
Highly predictable session tokens in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allow gaining administrative router access. Asus asuswrt Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUSWRT is the unified firmware used by ASUS in its latest routers and is the web-based graphical user interface of the ASUS router. An attacker could exploit this vulnerability to gain access to the router administrator. HTTPd server is one of the HTTP servers. The vulnerability is caused by the program generating easily guessable session tokens
VAR-201801-0538 CVE-2017-15656 Asus asuswrt Vulnerabilities related to certificate and password management CVSS V2: 4.0
CVSS V3: 8.8
Severity: HIGH
Password are stored in plaintext in nvram in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt. Asus asuswrt Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUSWRT is the unified firmware used by ASUS in its latest routers and is the web-based graphical user interface of the ASUS router. A plaintext password storage vulnerability exists in Asusasuswrt 3.0.0.4.380.7743 and earlier. An attacker could exploit the vulnerability to obtain password information. HTTPd server is one of the HTTP servers
VAR-201801-0537 CVE-2017-15655 Asus asuswrt Buffer error vulnerability CVSS V2: 9.3
CVSS V3: 9.6
Severity: CRITICAL
Multiple buffer overflow vulnerabilities exist in the HTTPd server in Asus asuswrt version <=3.0.0.4.376.X. All have been fixed in version 3.0.0.4.378, but this vulnerability was not previously disclosed. Some end-of-life routers have this version as the newest and thus are vulnerable at this time. This vulnerability allows for RCE with administrator rights when the administrator visits several pages. Asus asuswrt Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUSWRT is the unified firmware used by ASUS in its latest routers and is the web-based graphical user interface of the ASUS router. An attacker could exploit the vulnerability to remotely execute code with administrator privileges. HTTPd server is one of the HTTP servers
VAR-201710-1426 CVE-2017-7733 Fortinet FortiOS Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
A Cross-Site-Scripting (XSS) vulnerability in Fortinet FortiOS 5.4.0 to 5.4.5 and 5.6.0 allows a remote unauthenticated attacker to execute arbitrary javascript code via webUI "Login Disclaimer" redir parameter. Fortinet FortiOS Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Fortinet FortiOS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Fortinet FortiOS 5.6.0 and 5.4.0 through 5.4.5 are vulnerable. Fortinet FortiOS is a set of security operating systems developed by Fortinet Corporation for the FortiGate network security platform. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSL VPN, Web content filtering and anti-spam
VAR-201710-0718 CVE-2017-15567 MorphoSmart 1300 Series access control vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
The certificate import component in IDEMIA (formerly Morpho) MorphoSmart 1300 Series (aka MSO 1300 Series) devices allows local users to obtain a command shell, and consequently gain privileges, via unspecified vectors. NOTE: the vendor disputes this because there is no command shell in the product or in the associated SDK. IDEMIA ( Old Morpho) MorphoSmart 1300 series ( alias MSO 1300 series ) Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. IDEMIA (formerly known as Morpho) MorphoSmart 1300 Series (also known as MSO 1300 Series) devices is a fingerprint identification device produced by French company IDEMIA (formerly known as Morpho). The certificate import component is one of the certificate import components. There is a security vulnerability in the certificate import module in IDEMIA MSO 1300 Series devices. A local attacker can exploit this vulnerability to obtain a command shell, thereby gaining privileges
VAR-201710-0859 CVE-2017-15805 Cisco Small Business SA520 and SA540 Path traversal vulnerability in device firmware CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Cisco Small Business SA520 and SA540 devices with firmware 2.1.71 and 2.2.0.7 allow ../ directory traversal in scgi-bin/platform.cgi via the thispage parameter, for reading arbitrary files. CiscoSmallBusinessSA520 and SA540 are firewall devices of Cisco Systems of the United States. An attacker could exploit this vulnerability to read arbitrary files with the \342\200\230thispage\342\200\231 parameter