VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201709-0737 CVE-2017-11351 Axesstel MU553S Vulnerabilities related to the use of hard-coded credentials on devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Axesstel MU553S MU55XS-V1.14 devices have a default password of admin for the admin account. Axesstel MU553S The device contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AxesstelMU553S is a router from Axesstel, USA. An attacker could exploit the vulnerability to perform unauthorized operations. Axesstel MU553S is a router of Axesstel Company in the United States
VAR-201708-1444 CVE-2017-9247 Sierra Wireless Windows Mobile Broadband Driver Package Vulnerabilities related to unquoted search paths or elements CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Multiple unquoted service path vulnerabilities in Sierra Wireless Windows Mobile Broadband Driver Package (MBDP) with build ID < 4657 allows local users to launch processes with elevated privileges. LenovoIdeaPadMiix510-12ISK and other are Lenovo's notebook products. SierraWirelessWANdriver is one of the wireless drivers for Sierra Wireless, Canada. A local attacker could exploit the vulnerability with an unreferenced service path to execute the file with administrator privileges. Lenovo IdeaPadMiix 510-12ISK, etc. The following products are affected: Lenovo IdeaPadMiix 510-12ISK; IdeaPadMiix 510-12IKB; ThinkPad L450; ThinkPad L460 Larue-2; ThinkPad L560; ThinkPad P40; ThinkPad P50; ThinkPad P50s;
VAR-201707-0398 CVE-2017-11361 Inteno In the router "user" Vulnerability to read files by account CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Inteno routers have a JUCI ACL misconfiguration that allows the "user" account to read files, write to files, and add root SSH keys via JSON commands to ubus. (Exploitation is sometimes easy because the "user" password might be "user" or might match the Wi-Fi key.). Intenorouters is a wireless router from IntenoBroadband Technologies of Sweden. A security vulnerability exists in the Inteno router that caused the program to fail to properly configure the JUCIACL
VAR-201707-0387 CVE-2017-11344 plural ASUS For devices Asuswrt-Merlin Firmware and ASUS Firmware network map global buffer overflow vulnerability CVSS V2: 9.3
CVSS V3: 7.8
Severity: HIGH
Global buffer overflow in networkmap in Asuswrt-Merlin firmware for ASUS devices and ASUS firmware for ASUS RT-AC5300, RT_AC1900P, RT-AC68U, RT-AC68P, RT-AC88U, RT-AC66U, RT-AC66U_B1, RT-AC58U, RT-AC56U, RT-AC55U, RT-AC52U, RT-AC51U, RT-N18U, RT-N66U, RT-N56U, RT-AC3200, RT-AC3100, RT_AC1200GU, RT_AC1200G, RT-AC1200, RT-AC53, RT-N12HP, RT-N12HP_B1, RT-N12D1, RT-N12+, RT_N12+_PRO, RT-N16, and RT-N300 devices allows remote attackers to write shellcode at any address in the heap; this can be used to execute arbitrary code on the router by hosting a crafted device description XML document at a URL specified within a Location header in an SSDP response. ASUSRT-AC5300 and others are wireless routers from ASUS. A networkmap is one of the network diagram components. A buffer overflow vulnerability exists in networkmaps in several ASUS products
VAR-201707-0400 CVE-2017-11345 plural ASUS For devices Asuswrt-Merlin Firmware and ASUS Firmware network map stack buffer overflow vulnerability CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
Stack buffer overflow in networkmap in Asuswrt-Merlin firmware for ASUS devices and ASUS firmware for ASUS RT-AC5300, RT_AC1900P, RT-AC68U, RT-AC68P, RT-AC88U, RT-AC66U, RT-AC66U_B1, RT-AC58U, RT-AC56U, RT-AC55U, RT-AC52U, RT-AC51U, RT-N18U, RT-N66U, RT-N56U, RT-AC3200, RT-AC3100, RT_AC1200GU, RT_AC1200G, RT-AC1200, RT-AC53, RT-N12HP, RT-N12HP_B1, RT-N12D1, RT-N12+, RT_N12+_PRO, RT-N16, and RT-N300 devices allows remote attackers to execute arbitrary code on the router by hosting a crafted device description XML document (that includes a serviceType element) at a URL specified within a Location header in an SSDP response. ASUSRT-AC5300 and others are wireless routers from ASUS. A networkmap is one of the network diagram components. A buffer overflow vulnerability exists in networkmaps in several ASUS products
VAR-201707-0391 CVE-2017-11349 dataTaker DT8x dEX Vulnerable to program or schedule creation CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
dataTaker DT8x dEX 1.72.007 allows remote attackers to compose programs or schedules, for purposes such as sending e-mail messages or making outbound connections to FTP servers for uploading data. Thermo Fisher Scientific dataTaker DT8x dEX is a data acquisition recorder from Thermo Fisher Scientific, Australia. A security vulnerability exists in version 1.72.007 of Thermo Fisher Scientific dataTaker DT8x dEX. A remote attacker can exploit this vulnerability to obtain plaintext configuration information
VAR-201711-0222 CVE-2017-2706 Mate 9 Smartphone software path traversal vulnerability CVSS V2: 5.8
CVSS V3: 7.1
Severity: HIGH
Mate 9 smartphones with software MHA-AL00AC00B125 have a directory traversal vulnerability in Push module. Since the system does not verify the file name during decompression, system directories are traversed. It could be exploited to cause the attacker to replace files and impact the service. Mate 9 Smartphone software contains a path traversal vulnerability.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. HuaweiMate9 is a smartphone from China's Huawei company. Pushmodule is one of the message push modules
VAR-201711-0223 CVE-2017-2707 Mate 9 Vulnerabilities related to authorization, authority, and access control in smartphone software CVSS V2: 5.8
CVSS V3: 7.1
Severity: HIGH
Mate 9 smartphones with software MHA-AL00AC00B125 have a privilege escalation vulnerability in Push module. An attacker tricks a user to save a rich media into message on the smart phone, which could be exploited to cause the attacker to delete message or fake user to send message. Mate 9 Smartphone software contains vulnerabilities related to authorization, permissions, and access control.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. HuaweiMate9 is a smartphone from China's Huawei company. Pushmodule is one of the message push modules
VAR-201707-0300 CVE-2017-2348 Juniper Networks Junos OS Vulnerable to resource exhaustion CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The Juniper Enhanced jdhcpd daemon may experience high CPU utilization, or crash and restart upon receipt of an invalid IPv6 UDP packet. Both high CPU utilization and repeated crashes of the jdhcpd daemon can result in a denial of service as DHCP service is interrupted. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS 14.1X53 prior to 14.1X53-D12, 14.1X53-D38, 14.1X53-D40 on QFX, EX, QFabric System; 15.1 prior to 15.1F2-S18, 15.1R4 on all products and platforms; 15.1X49 prior to 15.1X49-D80 on SRX; 15.1X53 prior to 15.1X53-D51, 15.1X53-D60 on NFX, QFX, EX. Juniper Networks Junos OS Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Juniper Junos OS. A remote attacker can exploit this vulnerability to consume a large amount of CPU resources or cause the jdhcpd service to crash. The following releases are affected: Junos OS Release 14.1X53, Release 15.1, Release 15.1X49, Release 15.1X53
VAR-201707-0298 CVE-2017-2346 Juniper Networks MX Run on the platform Junos OS Data processing vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
An MS-MPC or MS-MIC Service PIC may crash when large fragmented packets are passed through an Application Layer Gateway (ALG). Repeated crashes of the Service PC can result in an extended denial of service condition. The issue can be seen only if NAT or stateful-firewall rules are configured with ALGs enabled. This issue was caused by the code change for PR 1182910 in Junos OS 14.1X55-D30, 14.1X55-D35, 14.2R7, 15.1R5, and 16.1R2. No other versions of Junos OS and no other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS on MX platforms running: 14.1X55 from 14.1X55-D30 to releases prior to 14.1X55-D35; 14.2R from 14.2R7 to releases prior to 14.2R7-S4, 14.2R8; 15.1R from 15.1R5 to releases prior to 15.1R5-S2, 15.1R6; 16.1R from 16.1R2 to releases prior to 16.1R3-S2, 16.1R4. Juniper MX Series is an MX series router product of Juniper Networks. Junos OS is a set of operating systems used in it. A security vulnerability exists in Junos OS in Juniper MX Series devices
VAR-201707-0299 CVE-2017-2347 Juniper Networks Junos OS Input validation vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A denial of service vulnerability in rpd daemon of Juniper Networks Junos OS allows a malformed MPLS ping packet to crash the rpd daemon if MPLS OAM is configured. Repeated crashes of the rpd daemon can result in an extended denial of service condition for the device. The affected releases are Junos OS 12.3X48 prior to 12.3X48-D50, 12.3X48-D55; 13.3 prior to 13.3R10; 14.1 prior to 14.1R4-S13, 14.1R8-S3, 14.1R9; 14.1X53 prior to 14.1X53-D42, 14.1X53-D50; 14.2 prior to 14.2R4-S8, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1F2-S14, 15.1F5-S7, 15.1F6-S4, 15.1F7, 15.1R4-S7, 15.1R5-S1, 15.1R6; 15.1X49 prior to 15.1X49-D100; 15.1X53 prior to 15.1X53-D105, 15.1X53-D47, 15.1X53-D62, 15.1X53-D70; 16.1 prior to 16.1R3-S3, 16.1R4. No other Juniper Networks products or platforms are affected by this issue. Juniper Networks Junos OS Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Juniper Junos is prone to a denial-of-service vulnerability. This issue could be exploited to execute arbitrary code; however, this has not been confirmed. The operating system provides a secure programming interface and Junos SDK. The following releases are affected: Junos OS Release 12.3X48, Release 13.3, Release 14.1, Release 14.1X53, Release 14.2, Release 15.1, Release 15.1X49, Release 15.1X53, Release 16.1
VAR-201707-0294 CVE-2017-2342 Junos OS Vulnerabilities related to security functions CVSS V2: 4.3
CVSS V3: 8.1
Severity: HIGH
MACsec feature on Juniper Networks Junos OS 15.1X49 prior to 15.1X49-D100 on SRX300 series does not report errors when a secure link can not be established. It falls back to an unencrypted link. This can happen when MACsec is configured on ports that are not capable of MACsec or when a secure link can not be established. This can mislead customers into believing that a link is secure. On SRX 300 series devices, prior to 15.1X49-D100, MACsec was only supported on control and fabric ports of SRX340 and SRX345 devices. SRX300 and and SRX320 did not have any MACsec capable ports. Configuring MACsec on ports that were not MACsec capable would have resulted in this issue. Affected releases are Juniper Networks Junos OS 15.1X49 prior to 15.1X49-D100 on SRX300 series. Junos OS Contains vulnerabilities related to security features.Information may be obtained and information may be altered. Junos OS is the operating system that runs on it. A remote attacker could exploit this vulnerability to view sensitive information on the target system
VAR-201707-0275 CVE-2017-3742 Windows and Android for Lenovo Connect2 Vulnerable to information disclosure CVSS V2: 2.3
CVSS V3: 4.8
Severity: MEDIUM
In Lenovo Connect2 versions earlier than 4.2.5.4885 for Windows and 4.2.5.3071 for Android, when an ad-hoc connection is made between two systems for the purpose of sharing files, the password for this ad-hoc connection will be stored in a user-readable location. An attacker with read access to the user's contents could connect to the Connect2 hotspot and see the contents of files while they are being transferred between the two systems. Windows and Android for Lenovo Connect2 Contains an information disclosure vulnerability.Information may be obtained. Lenovo Connect2 is a free management tool for content transfer between computers and mobile phones provided by Lenovo in China
VAR-201707-0293 CVE-2017-2341 Juniper Networks Junos OS Vulnerable to gaining access to the host operating environment CVSS V2: 7.2
CVSS V3: 8.8
Severity: HIGH
An insufficient authentication vulnerability on platforms where Junos OS instances are run in a virtualized environment, may allow unprivileged users on the Junos OS instance to gain access to the host operating environment, and thus escalate privileges. Affected releases are Juniper Networks Junos OS 14.1X53 prior to 14.1X53-D40 on QFX5110, QFX5200, QFX10002, QFX10008, QFX10016, EX4600 and NFX250; 15.1 prior to 15.1R5 on EX4600; 15.1X49 prior to 15.1X49-D70 on vSRX, SRX1500, SRX4100, SRX4200; 16.1 prior to 16.1R2 on EX4600, ACX5000 series. This issue does not affect vMX. No other Juniper Networks products or platforms are affected by this issue. Juniper QFX5110 series, etc. QFX5110 series is a series of Ethernet switches; Juniper vSRX series is a series of firewall emulator products; SRX1500 series is a series of firewall devices. Junos OS is one such operating system. A security vulnerability exists in Junos OS Release 14.1X53, Release 15.1, Release 15.1X49, and Release 16.1 in several Juniper products due to the program's inability to adequately perform authentication. The following products are affected: Juniper QFX5110 series, QFX5200 series, QFX10002 series, QFX10008 series, QFX10016 series, EX4600 series, NFX250 series, EX4600 series, vSRX series, SRX1500 series, SRX4100 series, SRX4000 series, ACX
VAR-201707-0295 CVE-2017-2343 Juniper SRX Runs on series devices Junos OS Vulnerabilities related to the use of hard-coded credentials CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
The Integrated User Firewall (UserFW) feature was introduced in Junos OS version 12.1X47-D10 on the Juniper SRX Series devices to provide simple integration of user profiles on top of the existing firewall polices. As part of an internal security review of the UserFW services authentication API, hardcoded credentials were identified and removed which can impact both the SRX Series device, and potentially LDAP and Active Directory integrated points. An attacker may be able to completely compromise SRX Series devices, as well as Active Directory servers and services. When Active Directory is compromised, it may allow access to user credentials, workstations, servers performing other functions such as email, database, etc. Inter-Forest Active Directory deployments may also be at risk as the attacker may gain full administrative control over one or more Active Directories depending on the credentials supplied by the administrator of the AD domains and SRX devices performing integrated authentication of users, groups and devices. To identify if your device is potentially vulnerable to exploitation, check to see if the service is operating; from CLI review the following output: root@SRX-Firewall# run show services user-identification active-directory-access domain-controller status extensive A result of "Status: Connected" will indicate that the service is active on the device. To evaluate if user authentication is occurring through the device: root@SRX-Firewall# run show services user-identification active-directory-access active-directory-authentication-table all Next review the results to see if valid users and groups are returned. e.g. Domain: juniperlab.com Total entries: 3 Source IP Username groups state 172.16.26.1 administrator Valid 192.168.26.2 engg01 engineers Valid 192.168.26.3 guest01 guests Valid Domain: NULL Total entries: 8 Source IP Username groups state 192.168.26.4 Invalid 192.168.26.5 Invalid This will also indicate that Valid users and groups are authenticating through the device. Affected releases are Juniper Networks Junos OS 12.3X48 from 12.3X48-D30 and prior to 12.3X48-D35 on SRX series; 15.1X49 from 15.1X49-D40 and prior to 15.1X49-D50 on SRX series. Devices on any version of Junos OS 12.1X46, or 12.1X47 are unaffected by this issue. Juniper SRX Runs on series devices Junos OS Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Junos OS is the operating system used in it. The operating system provides a secure programming interface and Junos SDK. A remote attacker could exploit this vulnerability to gain access to the target system and take control of the system
VAR-201707-0244 CVE-2017-10605 Juniper Networks vSRX Or SRX Runs on series devices Junos OS Input validation vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
On all vSRX and SRX Series devices, when the DHCP or DHCP relay is configured, specially crafted packet might cause the flowd process to crash, halting or interrupting traffic from flowing through the device(s). Repeated crashes of the flowd process may constitute an extended denial of service condition for the device(s). If the device is configured in high-availability, the RG1+ (data-plane) will fail-over to the secondary node. If the device is configured in stand-alone, there will be temporary traffic interruption until the flowd process is restored automatically. Sustained crafted packets may cause the secondary failover node to fail back, or fail completely, potentially halting flowd on both nodes of the cluster or causing flip-flop failovers to occur. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D67 on vSRX or SRX Series; 12.3X48 prior to 12.3X48-D50 on vSRX or SRX Series; 15.1X49 prior to 15.1X49-D91, 15.1X49-D100 on vSRX or SRX Series. Juniper Networks vSRX Or SRX Runs on series devices Junos OS Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. vSRX is a firewall simulator. SRX is a firewall device. Junos OS is one such operating system. DHCP is one of the dynamic host configuration protocols
VAR-201707-0243 CVE-2017-10604 Junos OS Vulnerabilities related to security functions CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
When the device is configured to perform account lockout with a defined period of time, any unauthenticated user attempting to log in as root with an incorrect password can trigger a lockout of the root account. When an SRX Series device is in cluster mode, and a cluster sync or failover operation occurs, then there will be errors associated with synch or failover while the root account is locked out. Administrators can confirm if the root account is locked out via the following command root@device> show system login lockout user root User Lockout start Lockout end root 1995-01-01 01:00:01 PDT 1995-11-01 01:31:01 PDT Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D65 on SRX series; 12.3X48 prior to 12.3X48-D45 on SRX series; 15.1X49 prior to 15.1X49-D75 on SRX series. Junos OS Contains vulnerabilities related to security features.Service operation interruption (DoS) There is a possibility of being put into a state. Juniper SRX Series devices is an SRX series gateway device of Juniper Networks (Juniper Networks). Junos OS is the operating system used in it. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in cluster mode in Junos OS Release 12.1X46, Release 12.3X48, and Release 15.1X49 on Juniper SRX Series devices. A remote attacker could exploit this vulnerability to cause a denial of service
VAR-201707-0246 CVE-2017-10601 Juniper Networks Junos OS Authentication vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A specific device configuration can result in a commit failure condition. When this occurs, a user is logged in without being prompted for a password while trying to login through console, ssh, ftp, telnet or su, etc., This issue relies upon a device configuration precondition to occur. Typically, device configurations are the result of a trusted administrative change to the system's running configuration. The following error messages may be seen when this failure occurs: mgd: error: commit failed: (statements constraint check failed) Warning: Commit failed, activating partial configuration. Warning: Edit the router configuration to fix these errors. If the administrative changes are not made that result in such a failure, then this issue is not seen. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS 12.3 prior to 12.3R10, 12.3R11; 12.3X48 prior to 12.3X48-D20; 13.2 prior to 13.2R8; 13.3 prior to 13.3R7; 14.1 prior to 14.1R4-S12, 14.1R5, 14.1R6; 14.1X53 prior to 14.1X53-D30; 14.2 prior to 14.2R4; 15.1 prior to 15.1F2, 15.1F3, 15.1R2. Juniper Networks Junos OS Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Juniper Junos OS due to insufficient authentication of logged-in users. A remote attacker could exploit this vulnerability to bypass authentication and gain privileges on the target system
VAR-201707-0241 CVE-2017-10602 Junos OS Vulnerable to buffer overflow CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A buffer overflow vulnerability in Junos OS CLI may allow a local authenticated user with read only privileges and access to Junos CLI, to execute code with root privileges. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D46 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions prior to 14.1X53-D130 on QFabric System; 14.2 versions prior to 14.2R4-S9, 14.2R6; 15.1 versions prior to 15.1F5, 15.1R3; 15.1X49 versions prior to 15.1X49-D40 on SRX Series; 15.1X53 versions prior to 15.1X53-D47 on NFX150, NFX250; 15.1X53 versions prior to 15.1X53-D65 on QFX10000 Series; 15.1X53 versions prior to 15.1X53-D233 on QFX5110, QFX5200. Juniper Junos is prone to a local buffer-overflow vulnerability. Failed exploits may result in denial-of-service conditions. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK. The following releases are affected: Juniper Junos OS Release 14.1X53, Release 14.2, Release 15.1, Release 15.1X49, Release 15.1X53
VAR-201707-0551 CVE-2017-1318 IBM MQ An arbitrary command execution vulnerability in the appliance CVSS V2: 9.0
CVSS V3: 8.8
Severity: High
IBM MQ Appliance 8.0 and 9.0 could allow an authenticated messaging administrator to execute arbitrary commands on the system, caused by command execution. IBM X-Force ID: 125730. Vendors have confirmed this vulnerability IBM X-Force ID: 125730 It is released as.Arbitrary commands could be executed by an authorized message administrator. An attacker can exploit this issue to execute arbitrary command on the affected system. This may aid in further attacks. MQ Appliance 9.0.1, 9.0.2, and 8.0.0.0 through 8.0.0.6 are vulnerable