VARIoT IoT vulnerabilities database
| VAR-201707-1361 | No CVE | Bako Travel Android App Has Any User Password Reset Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Bago Travel is a car time-sharing and sharing platform created by Beijing Bago Car Leasing Co., Ltd. With the help of the Internet of Things technology and advanced operation model, it realizes an unattended, rent-and-pay smart car usage method, and is committed to providing users with Provide 24-hour safe, convenient and economical car service, improve urban travel efficiency, reduce congestion and emissions, and build a beautiful travel experience.
There is an arbitrary user password reset vulnerability in the Android app of Ba Ge Travel. An attacker can use this vulnerability to reset their password arbitrarily.
| VAR-201707-1346 | No CVE | D-Link DIR-100 Cross-Site Request Forgery Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The D-LinkDIR-100 is a small broadband router with integrated firewall capabilities. A cross-site request forgery vulnerability exists in D-LinkDIR-1001.01. Allows remote attackers to build malicious URIs, entice users to resolve, and perform malicious actions in the target user context.
| VAR-201707-1365 | No CVE | SAP Netweaver Data Orchestration Engine Unspecified Information Disclosure Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
SAP Netweaver Data Orchestration Engine is prone to an unspecified information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.
| VAR-201707-1367 | No CVE | SAP NetWeaver Master Data Management Information Disclosure Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
SAP NetWeaver is prone to an information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.
| VAR-201711-0979 | CVE-2017-8141 | Huawei P10 Plus Vulnerability related to double release in smartphone software |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
The Touch Panel (TP) driver in P10 Plus smart phones with software versions earlier than VKY-AL00C00B153 has a memory double free vulnerability. An attacker with the root privilege of the Android system tricks a user into installing a malicious application, and the application can start multiple threads and try to free specific memory, which could triggers double free and causes a system crash or arbitrary code execution. Huawei P10 Plus Smartphone software contains a double release vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HuaweiP10Plus is a Huawei smartphone device from China. There is a memory duplication release vulnerability in the touchscreen driver of the HuaweiP10Plus phone
| VAR-201707-1217 | CVE-2017-7730 | iSmartAlarm cube Vulnerability related to input validation on devices |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
iSmartAlarm cube devices allow Denial of Service. Sending a SYN flood on port 12345 will freeze the "cube" and it will stop responding. iSmartAlarm cube The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. An attacker could use this vulnerability to cause a denial of service (device stops responding)
| VAR-201711-0725 | CVE-2017-11169 | iBall iB-WRA300N3GT Vulnerabilities related to authorization, authority, and access control in devices |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Privilege Escalation on iBall iB-WRA300N3GT iB-WRA300N3GT_1.1.1 devices allows remote authenticated users to obtain root privileges by leveraging a guest/user/normal account to submit a modified privilege parameter to /form2userconfig.cgi. iBall iB-WRA300N3GT Devices have vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The iBalliB-WRA300N3GT is a wireless router product from iBall India. An elevation of privilege vulnerability exists in iBalliB-WRA300N3GT with iB-WRA300N3GT_1.1.1 firmware. A remote attacker can exploit this vulnerability to gain root privileges
| VAR-201707-1215 | CVE-2017-7728 | iSmartAlarm cube Cryptographic vulnerabilities in devices |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
On iSmartAlarm cube devices, there is authentication bypass leading to remote execution of commands (e.g., setting the alarm on/off), related to incorrect cryptography. iSmartAlarm cube The device contains cryptographic vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. iSmartAlarmcubedevices is a smart home device from iSmartAlarm. An authentication bypass vulnerability exists in the iSmartAlarmcube device. A remote attacker can exploit the vulnerability to execute commands
| VAR-201707-1216 | CVE-2017-7729 | iSmartAlarm cube Device Access Control Error Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
On iSmartAlarm cube devices, there is Incorrect Access Control because a "new key" is transmitted in cleartext. iSmartAlarmcubedevices is a smart home device from iSmartAlarm. There are currently no detailed details of the vulnerability provided
| VAR-201707-0616 | CVE-2017-11165 | dataTaker DT80 dEX Vulnerable to obtaining important authentication and configuration information |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
dataTaker DT80 dEX 1.50.012 allows remote attackers to obtain sensitive credential and configuration information via a direct request for the /services/getFile.cmd?userfile=config.xml URI. Thermo Fisher Scientific dataTaker DT80 dEX is a data acquisition recorder from Thermo Fisher Scientific, Australia. A security vulnerability exists in version 1.50.012 of the Thermo Fisher Scientific dataTaker DT80 dEX
| VAR-201707-0990 | CVE-2017-8011 | plural EMC Vulnerabilities related to the use of hard-coded credentials in products |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
EMC ViPR SRM, EMC Storage M&R, EMC VNX M&R, EMC M&R for SAS Solution Packs (EMC ViPR SRM prior to 4.1, EMC Storage M&R prior to 4.1, EMC VNX M&R all versions, EMC M&R (Watch4Net) for SAS Solution Packs all versions) contain undocumented accounts with default passwords for Webservice Gateway and RMI JMX components. A remote attacker with the knowledge of the default password may potentially use these accounts to run arbitrary web service and remote procedure calls on the affected system. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Dell EMC VNX Monitoring and Reporting. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the Scheduler class. An attacker can use the static credentials to access VNX Webservice Gateway service's API to execute arbitrary code under the context of SYSTEM. Multiple EMC Products are prone to an insecure default-password vulnerability.
Remote attackers with knowledge of the default credentials may exploit this vulnerability to gain unauthorized access and perform unauthorized actions. This may aid in further attacks.
Resolution:
Customers are strongly advised to change any default passwords for Webservice Gateway and RMI JMX components.
* EMC ViPR SRM and EMC Storage M&R customers should refer to the EMC M&R Platform 6.8 Security Configuration Guide (part of the EMC ViPR SRM 4.1 documentation, found at https://community.emc.com/docs/DOC-59221) for the procedure to modify default passwords
* EMC M&R (Watch4Net) for SAS Solution Packs customers should refer to the knowledgebase article below for the procedure to modify default passwords: https://support.emc.com/kb/501588
* EMC VNX M&R customers should refer to the knowledgebase article below for the procedure to modify default passwords: https://support.emc.com/kb/501419
Link to remedies:
Credits:
EMC would like to thank rgod working with Trend Micro's Zero Day Initiative for reporting this vulnerability.
[The following is standard text included in all security advisories. Please do not change or delete.]
Read and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867.
For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQEcBAEBCAAGBQJZZSKkAAoJEHbcu+fsE81ZCHUH/0XvP8+rUcE7d4SljEpl8Ayd
3YMeSnak8CPcHAJq6xTWjDt8KnBlwwSaeAvBap0akxF/sqnnOOk7wLDBuc9kDt7y
yp1DgiGgLOlVv5s8kAPCnJ0b7JkszrZ8mleJnqWBohKYUhlPeNTOj+x/NBmBoEWN
fFvQ/deN2ArzRyz4XYDMbEfJFe2f8hSCg9YjZpdMi0nTRlRn6WRxgX5kwKjh2w6I
tKakT0UGyOPv3VUaolDrCTegvt4BeBeQzeEZmlP0IEWeVmLLRgrpH4k8Dle9K+l5
BVDI2QFcg++CS5L1KPdZr+OVSOVUhdX6MtWlShAvZrxQ54zGf237fubsNJd6V6U=
=iu/j
-----END PGP SIGNATURE-----
| VAR-201707-1213 | CVE-2017-7726 | iSmartAlarm cube Device certificate validation vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
iSmartAlarm cube devices have an SSL Certificate Validation Vulnerability. iSmartAlarmcubedevices is a smart home device from iSmartAlarm. An information disclosure vulnerability exists in the iSmartAlarmcube device. A remote attack can exploit this vulnerability to obtain arbitrary passwords or personal data. [+] Credits: Ilia Shnaidman
[+] Source:
http://dojo.bullguard.com/blog/burglar-hacker-when-a-physical-security-is-compromised-by-iot-vulnerabilities/
Vendor:
=============
iSmartAlarm, inc.
Product:
===========================
iSmartAlarm cube - All versions
iSmartAlarm is one of the leading IoT manufactures in the domain of smart alarm systems.
It provides a fully integrated alarm system with siren, smart cameras and locks.
It functions like any alarm system, but with the benefits of a connected device: alerts pop up on your phone,
offering you full remote control via mobile app wherever you are.
Attack Vectors:
================
An attacker can get any password/personal data by setting man
in the middle sniffer attack with a fake certificate on port 8443.
Network Access:
===============
Remote
Severity:
=========
High
Disclosure Timeline:
=====================================
Jan 30, 2017: Initial contact to vendor
Feb 1, 2017: Vendor replied, requesting details
Feb 2, 2017: Disclosure to vendor
Apr 12, 2017: After vendor didn't replied, I've approached CERT
Apr 13, 2017: Confirmed receipt by CERT and assigning CVEs
July 05, 2017: Public disclosure
| VAR-201709-0973 | CVE-2017-11162 | Synology Photo Station Path traversal vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Directory traversal vulnerability in synphotoio in Synology Photo Station before 6.7.4-3433 and 6.3-2968 allows remote authenticated users to read arbitrary files via unspecified vectors. Synology Photo Station Contains a path traversal vulnerability.Information may be obtained. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet
| VAR-201709-0972 | CVE-2017-11161 | Synology Photo Station In SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Multiple SQL injection vulnerabilities in Synology Photo Station before 6.7.4-3433 and 6.3-2968 allow remote attackers to execute arbitrary SQL commands via the (1) article_id parameter to label.php; or (2) type parameter to synotheme.php. Synology Photo Station Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet
| VAR-201708-1080 | CVE-2017-11155 | Synology Photo Station Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An information exposure vulnerability in index.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to obtain sensitive system information via unspecified vectors. Synology Photo Station Contains an information disclosure vulnerability.Information may be obtained. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet
| VAR-201708-1079 | CVE-2017-11154 | Synology Photo Station Vulnerable to unlimited upload of dangerous types of files |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
Unrestricted file upload vulnerability in PixlrEditorHandler.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to create arbitrary PHP scripts via the type parameter. Synology Photo Station Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet
| VAR-201708-1078 | CVE-2017-11153 | Synology Photo Station Vulnerable to unreliable data deserialization |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Deserialization vulnerability in synophoto_csPhotoMisc.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to gain administrator privileges via a crafted serialized payload. Synology Photo Station Contains a vulnerability in the deserialization of unreliable data.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet. There is a security vulnerability in the synophoto_csPhotoMisc.php file in Synology Photo Station versions prior to 6.7.3-3432 and versions prior to 6.3-2967
| VAR-201708-1077 | CVE-2017-11152 | Synology Photo Station Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Directory traversal vulnerability in PixlrEditorHandler.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to write arbitrary files via the path parameter. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet
| VAR-201708-1076 | CVE-2017-11151 | Synology Photo Station Authentication vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability in synotheme_upload.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to upload arbitrary files without authentication via the logo_upload action. Synology Photo Station Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet
| VAR-201708-1075 | CVE-2017-11150 | Synology Office Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 7.8 Severity: HIGH |
Command injection vulnerability in Document.php in Synology Office 2.2.0-1502 and 2.2.1-1506 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the crafted file name of RTF documents. Synology Office Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Synology Office is a set of web-based office software system developed by Synology. The system has features such as creating documents and spreadsheets online, and importing local files