VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201707-1361 No CVE Bako Travel Android App Has Any User Password Reset Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Bago Travel is a car time-sharing and sharing platform created by Beijing Bago Car Leasing Co., Ltd. With the help of the Internet of Things technology and advanced operation model, it realizes an unattended, rent-and-pay smart car usage method, and is committed to providing users with Provide 24-hour safe, convenient and economical car service, improve urban travel efficiency, reduce congestion and emissions, and build a beautiful travel experience. There is an arbitrary user password reset vulnerability in the Android app of Ba Ge Travel. An attacker can use this vulnerability to reset their password arbitrarily.
VAR-201707-1346 No CVE D-Link DIR-100 Cross-Site Request Forgery Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The D-LinkDIR-100 is a small broadband router with integrated firewall capabilities. A cross-site request forgery vulnerability exists in D-LinkDIR-1001.01. Allows remote attackers to build malicious URIs, entice users to resolve, and perform malicious actions in the target user context.
VAR-201707-1365 No CVE SAP Netweaver Data Orchestration Engine Unspecified Information Disclosure Vulnerability CVSS V2: -
CVSS V3: -
Severity: -
SAP Netweaver Data Orchestration Engine is prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.
VAR-201707-1367 No CVE SAP NetWeaver Master Data Management Information Disclosure Vulnerability CVSS V2: -
CVSS V3: -
Severity: -
SAP NetWeaver is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.
VAR-201711-0979 CVE-2017-8141 Huawei P10 Plus Vulnerability related to double release in smartphone software CVSS V2: 9.3
CVSS V3: 7.8
Severity: HIGH
The Touch Panel (TP) driver in P10 Plus smart phones with software versions earlier than VKY-AL00C00B153 has a memory double free vulnerability. An attacker with the root privilege of the Android system tricks a user into installing a malicious application, and the application can start multiple threads and try to free specific memory, which could triggers double free and causes a system crash or arbitrary code execution. Huawei P10 Plus Smartphone software contains a double release vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HuaweiP10Plus is a Huawei smartphone device from China. There is a memory duplication release vulnerability in the touchscreen driver of the HuaweiP10Plus phone
VAR-201707-1217 CVE-2017-7730 iSmartAlarm cube Vulnerability related to input validation on devices CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
iSmartAlarm cube devices allow Denial of Service. Sending a SYN flood on port 12345 will freeze the "cube" and it will stop responding. iSmartAlarm cube The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. An attacker could use this vulnerability to cause a denial of service (device stops responding)
VAR-201711-0725 CVE-2017-11169 iBall iB-WRA300N3GT Vulnerabilities related to authorization, authority, and access control in devices CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Privilege Escalation on iBall iB-WRA300N3GT iB-WRA300N3GT_1.1.1 devices allows remote authenticated users to obtain root privileges by leveraging a guest/user/normal account to submit a modified privilege parameter to /form2userconfig.cgi. iBall iB-WRA300N3GT Devices have vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The iBalliB-WRA300N3GT is a wireless router product from iBall India. An elevation of privilege vulnerability exists in iBalliB-WRA300N3GT with iB-WRA300N3GT_1.1.1 firmware. A remote attacker can exploit this vulnerability to gain root privileges
VAR-201707-1215 CVE-2017-7728 iSmartAlarm cube Cryptographic vulnerabilities in devices CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
On iSmartAlarm cube devices, there is authentication bypass leading to remote execution of commands (e.g., setting the alarm on/off), related to incorrect cryptography. iSmartAlarm cube The device contains cryptographic vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. iSmartAlarmcubedevices is a smart home device from iSmartAlarm. An authentication bypass vulnerability exists in the iSmartAlarmcube device. A remote attacker can exploit the vulnerability to execute commands
VAR-201707-1216 CVE-2017-7729 iSmartAlarm cube Device Access Control Error Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
On iSmartAlarm cube devices, there is Incorrect Access Control because a "new key" is transmitted in cleartext. iSmartAlarmcubedevices is a smart home device from iSmartAlarm. There are currently no detailed details of the vulnerability provided
VAR-201707-0616 CVE-2017-11165 dataTaker DT80 dEX Vulnerable to obtaining important authentication and configuration information CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
dataTaker DT80 dEX 1.50.012 allows remote attackers to obtain sensitive credential and configuration information via a direct request for the /services/getFile.cmd?userfile=config.xml URI. Thermo Fisher Scientific dataTaker DT80 dEX is a data acquisition recorder from Thermo Fisher Scientific, Australia. A security vulnerability exists in version 1.50.012 of the Thermo Fisher Scientific dataTaker DT80 dEX
VAR-201707-0990 CVE-2017-8011 plural EMC Vulnerabilities related to the use of hard-coded credentials in products CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
EMC ViPR SRM, EMC Storage M&R, EMC VNX M&R, EMC M&R for SAS Solution Packs (EMC ViPR SRM prior to 4.1, EMC Storage M&R prior to 4.1, EMC VNX M&R all versions, EMC M&R (Watch4Net) for SAS Solution Packs all versions) contain undocumented accounts with default passwords for Webservice Gateway and RMI JMX components. A remote attacker with the knowledge of the default password may potentially use these accounts to run arbitrary web service and remote procedure calls on the affected system. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Dell EMC VNX Monitoring and Reporting. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the Scheduler class. An attacker can use the static credentials to access VNX Webservice Gateway service's API to execute arbitrary code under the context of SYSTEM. Multiple EMC Products are prone to an insecure default-password vulnerability. Remote attackers with knowledge of the default credentials may exploit this vulnerability to gain unauthorized access and perform unauthorized actions. This may aid in further attacks. Resolution: Customers are strongly advised to change any default passwords for Webservice Gateway and RMI JMX components. * EMC ViPR SRM and EMC Storage M&R customers should refer to the EMC M&R Platform 6.8 Security Configuration Guide (part of the EMC ViPR SRM 4.1 documentation, found at https://community.emc.com/docs/DOC-59221) for the procedure to modify default passwords * EMC M&R (Watch4Net) for SAS Solution Packs customers should refer to the knowledgebase article below for the procedure to modify default passwords: https://support.emc.com/kb/501588 * EMC VNX M&R customers should refer to the knowledgebase article below for the procedure to modify default passwords: https://support.emc.com/kb/501419 Link to remedies: Credits: EMC would like to thank rgod working with Trend Micro's Zero Day Initiative for reporting this vulnerability. [The following is standard text included in all security advisories. Please do not change or delete.] Read and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867. For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJZZSKkAAoJEHbcu+fsE81ZCHUH/0XvP8+rUcE7d4SljEpl8Ayd 3YMeSnak8CPcHAJq6xTWjDt8KnBlwwSaeAvBap0akxF/sqnnOOk7wLDBuc9kDt7y yp1DgiGgLOlVv5s8kAPCnJ0b7JkszrZ8mleJnqWBohKYUhlPeNTOj+x/NBmBoEWN fFvQ/deN2ArzRyz4XYDMbEfJFe2f8hSCg9YjZpdMi0nTRlRn6WRxgX5kwKjh2w6I tKakT0UGyOPv3VUaolDrCTegvt4BeBeQzeEZmlP0IEWeVmLLRgrpH4k8Dle9K+l5 BVDI2QFcg++CS5L1KPdZr+OVSOVUhdX6MtWlShAvZrxQ54zGf237fubsNJd6V6U= =iu/j -----END PGP SIGNATURE-----
VAR-201707-1213 CVE-2017-7726 iSmartAlarm cube Device certificate validation vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
iSmartAlarm cube devices have an SSL Certificate Validation Vulnerability. iSmartAlarmcubedevices is a smart home device from iSmartAlarm. An information disclosure vulnerability exists in the iSmartAlarmcube device. A remote attack can exploit this vulnerability to obtain arbitrary passwords or personal data. [+] Credits: Ilia Shnaidman [+] Source: http://dojo.bullguard.com/blog/burglar-hacker-when-a-physical-security-is-compromised-by-iot-vulnerabilities/ Vendor: ============= iSmartAlarm, inc. Product: =========================== iSmartAlarm cube - All versions iSmartAlarm is one of the leading IoT manufactures in the domain of smart alarm systems. It provides a fully integrated alarm system with siren, smart cameras and locks. It functions like any alarm system, but with the benefits of a connected device: alerts pop up on your phone, offering you full remote control via mobile app wherever you are. Attack Vectors: ================ An attacker can get any password/personal data by setting man in the middle sniffer attack with a fake certificate on port 8443. Network Access: =============== Remote Severity: ========= High Disclosure Timeline: ===================================== Jan 30, 2017: Initial contact to vendor Feb 1, 2017: Vendor replied, requesting details Feb 2, 2017: Disclosure to vendor Apr 12, 2017: After vendor didn't replied, I've approached CERT Apr 13, 2017: Confirmed receipt by CERT and assigning CVEs July 05, 2017: Public disclosure
VAR-201709-0973 CVE-2017-11162 Synology Photo Station Path traversal vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Directory traversal vulnerability in synphotoio in Synology Photo Station before 6.7.4-3433 and 6.3-2968 allows remote authenticated users to read arbitrary files via unspecified vectors. Synology Photo Station Contains a path traversal vulnerability.Information may be obtained. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet
VAR-201709-0972 CVE-2017-11161 Synology Photo Station In SQL Injection vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Multiple SQL injection vulnerabilities in Synology Photo Station before 6.7.4-3433 and 6.3-2968 allow remote attackers to execute arbitrary SQL commands via the (1) article_id parameter to label.php; or (2) type parameter to synotheme.php. Synology Photo Station Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet
VAR-201708-1080 CVE-2017-11155 Synology Photo Station Vulnerable to information disclosure CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An information exposure vulnerability in index.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to obtain sensitive system information via unspecified vectors. Synology Photo Station Contains an information disclosure vulnerability.Information may be obtained. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet
VAR-201708-1079 CVE-2017-11154 Synology Photo Station Vulnerable to unlimited upload of dangerous types of files CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
Unrestricted file upload vulnerability in PixlrEditorHandler.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to create arbitrary PHP scripts via the type parameter. Synology Photo Station Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet
VAR-201708-1078 CVE-2017-11153 Synology Photo Station Vulnerable to unreliable data deserialization CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Deserialization vulnerability in synophoto_csPhotoMisc.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to gain administrator privileges via a crafted serialized payload. Synology Photo Station Contains a vulnerability in the deserialization of unreliable data.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet. There is a security vulnerability in the synophoto_csPhotoMisc.php file in Synology Photo Station versions prior to 6.7.3-3432 and versions prior to 6.3-2967
VAR-201708-1077 CVE-2017-11152 Synology Photo Station Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Directory traversal vulnerability in PixlrEditorHandler.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to write arbitrary files via the path parameter. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet
VAR-201708-1076 CVE-2017-11151 Synology Photo Station Authentication vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in synotheme_upload.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to upload arbitrary files without authentication via the logo_upload action. Synology Photo Station Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Synology Photo Station is a set of solutions from Synology for sharing pictures, videos and blogs on the Internet
VAR-201708-1075 CVE-2017-11150 Synology Office Command injection vulnerability CVSS V2: 6.5
CVSS V3: 7.8
Severity: HIGH
Command injection vulnerability in Document.php in Synology Office 2.2.0-1502 and 2.2.1-1506 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the crafted file name of RTF documents. Synology Office Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Synology Office is a set of web-based office software system developed by Synology. The system has features such as creating documents and spreadsheets online, and importing local files