VARIoT IoT vulnerabilities database
| VAR-201706-0360 | CVE-2017-3750 | Lenovo VIBE cell phone's Lenovo Security Android Vulnerabilities related to authorization, authority, and access control in applications |
CVSS V2: 6.9 CVSS V3: 6.4 Severity: MEDIUM |
On Lenovo VIBE mobile phones, the Lenovo Security Android application allows private data to be backed up and restored via Android Debug Bridge, which allows tampering leading to privilege escalation in conjunction with CVE-2017-3748 and CVE-2017-3749. Lenovo VIBE cell phone's Lenovo Security Android Applications have vulnerabilities related to authorization, permissions, and access control.CVE-2017-3748 and CVE-2017-3749 Information is obtained, information is tampered with, and service operation is disrupted by exploiting it together with vulnerabilities (DoS) There is a possibility of being put into a state. Android6.0Marshmallow is a Linux-based open source operating system jointly developed by Google and the Open Handheld Device Alliance (OHA). LenovoA2010-a, etc. are all Lenovo's smartphone products using the Android6.0 Marshmallow operating system. A Permission Access Vulnerability exists in several LenovoVIBE phones using versions prior to Android6.0 Marshmallow, which stems from the LenovoSecurityAndroid app allowing backup and storage of private data via AndroidDebugBridge. An attacker could exploit the vulnerability to gain elevated privileges
| VAR-201706-0461 | CVE-2017-6036 | Belden Hirschmann GECKO Lite Managed Server-side request forgery vulnerability in switch |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
A Server-Side Request Forgery issue was discovered in Belden Hirschmann GECKO Lite Managed switch, Version 2.0.00 and prior versions. The web server receives a request, but does not sufficiently verify that the request is being sent to the expected destination. BeldenHirschmannGECKO is a streamlined managed industrial Ethernet switch. The vulnerability stems from a program that failed to adequately verify the request. An attacker could exploit the vulnerability to gain sensitive information by accessing a copy of the configuration file. The vulnerability is caused by the program's insufficient verification of requests
| VAR-201706-0462 | CVE-2017-6038 | Belden Hirschmann GECKO Cross-Site Request Forgery Vulnerability |
CVSS V2: 5.8 CVSS V3: 7.1 Severity: HIGH |
A Cross-Site Request Forgery issue was discovered in Belden Hirschmann GECKO Lite Managed switch, Version 2.0.00 and prior versions. The web application does not sufficiently verify that requests were provided by the user who submitted the request. BeldenHirschmannGECKO is a streamlined managed industrial Ethernet switch. The vulnerability stems from a program that failed to adequately verify the request. An attacker could exploit the vulnerability to perform unauthorized operations
| VAR-201706-0464 | CVE-2017-6040 | Belden Hirschmann GECKO Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
An Information Exposure issue was discovered in Belden Hirschmann GECKO Lite Managed switch, Version 2.0.00 and prior versions. Non-sensitive information can be obtained anonymously. BeldenHirschmannGECKO is a streamlined managed industrial Ethernet switch
| VAR-201707-1052 | CVE-2017-6736 | Cisco IOS and IOS XE of SNMP Subsystem vulnerable to remote code execution on affected systems |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities.
The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload.
Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable.
There are workarounds that address these vulnerabilities.
These issues are being tracked by Cisco Bug IDs-CSCve54313,CSCve57697,CSCve60276,CSCve60376,CSCve60402,CSCve60507,CSCve66540,CSCve66601,CSCve66658,CSCve78027,CSCve89865. Simple Network Management Protocol (SNMP) subsystem is one of the simple network management subsystems used for network device management information exchange
| VAR-201707-0930 | CVE-2017-6737 | Cisco IOS and IOS XE of SNMP Subsystem vulnerable to remote code execution on affected systems |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device.
The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system.
Only traffic directed to the affected system can be used to exploit this vulnerability. Cisco IOS and IOS XE Software are prone to multiple remote code-execution vulnerabilities.
These issues are being tracked by Cisco Bug IDs-CSCve54313,CSCve57697,CSCve60276,CSCve60376,CSCve60402,CSCve60507,CSCve66540,CSCve66601,CSCve66658,CSCve78027,CSCve89865. Simple Network Management Protocol (SNMP) subsystem is one of the simple network management subsystems used for network device management information exchange. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable
| VAR-201707-0962 | CVE-2017-6738 | Cisco IOS and IOS XE of SNMP Subsystem vulnerable to remote code execution on affected systems |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities.
The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload.
Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable.
There are workarounds that address these vulnerabilities.
These issues are being tracked by Cisco Bug IDs-CSCve54313,CSCve57697,CSCve60276,CSCve60376,CSCve60402,CSCve60507,CSCve66540,CSCve66601,CSCve66658,CSCve78027,CSCve89865. Simple Network Management Protocol (SNMP) subsystem is one of the simple network management subsystems used for network device management information exchange
| VAR-201707-0958 | CVE-2017-6739 | Cisco IOS and IOS XE of SNMP Subsystem vulnerable to remote code execution on affected systems |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device.
The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system.
Only traffic directed to the affected system can be used to exploit this vulnerability. Cisco IOS and IOS XE Software are prone to multiple remote code-execution vulnerabilities.
These issues are being tracked by Cisco Bug IDs-CSCve54313,CSCve57697,CSCve60276,CSCve60376,CSCve60402,CSCve60507,CSCve66540,CSCve66601,CSCve66658,CSCve78027,CSCve89865. Simple Network Management Protocol (SNMP) subsystem is one of the simple network management subsystems used for network device management information exchange. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable
| VAR-201707-0959 | CVE-2017-6740 | Cisco IOS and IOS XE of SNMP Subsystem vulnerable to remote code execution on affected systems |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities.
The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload.
Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable.
There are workarounds that address these vulnerabilities.
These issues are being tracked by Cisco Bug IDs-CSCve54313,CSCve57697,CSCve60276,CSCve60376,CSCve60402,CSCve60507,CSCve66540,CSCve66601,CSCve66658,CSCve78027,CSCve89865. Simple Network Management Protocol (SNMP) subsystem is one of the simple network management subsystems used for network device management information exchange
| VAR-201707-0963 | CVE-2017-6741 | Cisco IOS and IOS XE of SNMP Subsystem vulnerable to remote code execution on affected systems |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device.
The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system.
Only traffic directed to the affected system can be used to exploit this vulnerability. Cisco IOS and IOS XE Software are prone to multiple remote code-execution vulnerabilities.
These issues are being tracked by Cisco Bug IDs-CSCve54313,CSCve57697,CSCve60276,CSCve60376,CSCve60402,CSCve60507,CSCve66540,CSCve66601,CSCve66658,CSCve78027,CSCve89865. Simple Network Management Protocol (SNMP) subsystem is one of the simple network management subsystems used for network device management information exchange
| VAR-201707-0964 | CVE-2017-6742 | Cisco IOS and IOS XE of SNMP Vulnerabilities in subsystems that could allow remote code execution on affected systems |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device.
The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system.
Only traffic directed to the affected system can be used to exploit this vulnerability. Cisco IOS and IOS XE Software are prone to multiple remote code-execution vulnerabilities.
These issues are being tracked by Cisco Bug IDs-CSCve54313,CSCve57697,CSCve60276,CSCve60376,CSCve60402,CSCve60507,CSCve66540,CSCve66601,CSCve66658,CSCve78027,CSCve89865. Simple Network Management Protocol (SNMP) subsystem is one of the simple network management subsystems used for network device management information exchange. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable
| VAR-201707-0965 | CVE-2017-6743 | Cisco IOS and IOS XE of SNMP Subsystem vulnerable to remote code execution on affected systems |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities.
The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload.
Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable.
There are workarounds that address these vulnerabilities.
These issues are being tracked by Cisco Bug IDs-CSCve54313,CSCve57697,CSCve60276,CSCve60376,CSCve60402,CSCve60507,CSCve66540,CSCve66601,CSCve66658,CSCve78027,CSCve89865. Simple Network Management Protocol (SNMP) subsystem is one of the simple network management subsystems used for network device management information exchange
| VAR-201707-0960 | CVE-2017-6744 | Cisco IOS and IOS XE of SNMP Subsystem vulnerable to remote code execution on affected systems |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities.
The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload.
Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable.
There are workarounds that address these vulnerabilities.
These issues are being tracked by Cisco Bug IDs-CSCve54313,CSCve57697,CSCve60276,CSCve60376,CSCve60402,CSCve60507,CSCve66540,CSCve66601,CSCve66658,CSCve78027,CSCve89865. Simple Network Management Protocol (SNMP) subsystem is one of the simple network management subsystems used for network device management information exchange
| VAR-201706-1146 | No CVE | Huawei Y6 Pro graphics Driver Memory Leak Vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
HuaweiY6Pro is a smartphone from China's Huawei company. A memory leak vulnerability exists in the Huawei Y6Pro mobile phone graphics driver using the MTK platform. Due to insufficient input verification, the attacker lured the user to install a malicious application that obtained the system privileges of the Android system. The application can use this vulnerability to send specific parameters to the mobile phone driver, resulting in memory leaks.
| VAR-201706-1148 | No CVE | Huawei Y6 Pro graphics Driver Buffer Overflow Vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
HuaweiY6Pro is a smartphone from China's Huawei company. A buffer overflow vulnerability exists in the Huawei Y6Pro mobile phone graphics driver using the MTK platform. Due to insufficient input verification, the attacker lured the user to install a malicious application that obtained the system privileges of the Android system. The application can use the vulnerability to send specific parameters to the mobile phone driver, resulting in system restart or privilege escalation.
| VAR-201711-0980 | CVE-2017-8142 | Huawei Mate 9 and Mate 9 Pro Vulnerability related to the use of released memory in smartphone software |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
The Trusted Execution Environment (TEE) module driver of Mate 9 and Mate 9 Pro smart phones with software versions earlier than MHA-AL00BC00B221 and versions earlier than LON-AL00BC00B221 has a use after free (UAF) vulnerability. An attacker tricks a user into installing a malicious application, and the application can start multiple threads and try to create and free specific memory, which could triggers access memory after free it and causes a system crash or arbitrary code execution. Mate9 and Mate9Pro are smart phones from China's Huawei company. Trusted Execution Environment TEE is a security zone on the mobile device's main processor. The Huawei Mate9 and Mate9Pro mobile phone TEE modules have a UseAfterFree (UAF) security vulnerability. An attacker lures a user to install a malicious mobile application
| VAR-201706-0358 | CVE-2017-3748 | Lenovo VIBE cell phone's nac_server Vulnerability related to authorization, authority, and access control in components |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
On Lenovo VIBE mobile phones, improper access controls on the nac_server component can be abused in conjunction with CVE-2017-3749 and CVE-2017-3750 to elevate privileges to the root user (commonly known as 'rooting' or "jail breaking" a device). Lenovo VIBE cell phone's nac_server The component contains vulnerabilities related to authorization, permissions, and access control.CVE-2017-3749 and CVE-2017-3750 Information is obtained, information is tampered with, and service operation is disrupted by exploiting it together with vulnerabilities (DoS) There is a possibility of being put into a state. VIBE is the Android smartphone series launched by Lenovo. There is a local elevation of privilege vulnerability in Lenovo's nac_server component, which can be exploited by an attacker to gain access to the root user. Lenovo VIBE Mobile is prone to a local privilege-escalation vulnerability
| VAR-201802-0616 | CVE-2017-9969 | Schneider Electric IGSS Mobile Information Disclosure Vulnerability |
CVSS V2: 2.1 CVSS V3: 6.7 Severity: MEDIUM |
An information disclosure vulnerability exists in Schneider Electric's IGSS Mobile application version 3.01 and prior. Passwords are stored in clear text in the configuration which can result in exposure of sensitive information. Schneider Electric IGSS Mobile is a set of mobile application for managing IGSS (Shared Services Platform) by Schneider Electric of France. An attacker could use this vulnerability to obtain sensitive information
| VAR-201709-1078 | CVE-2017-9961 | Schneider Electric Pro-face GP-Pro EX Arbitrary code execution vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
A vulnerability exists in Schneider Electric's Pro-Face GP Pro EX version 4.07.000 that allows an attacker to execute arbitrary code. Malicious code installation requires an access to the computer. By placing a specific DLL/OCX file, an attacker is able to force the process to load arbitrary DLL and execute arbitrary code in the context of the process. Schneider Electric GP Pro EX Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Pro-face GP-Pro EX is the development software for Pro-face GP4000, GP4100, GP4000M, LT4000M, LT3000, EZ Series, SP5000 Smart Portal series products. Schneider Electric Pro-face GP-Pro EX is prone to an arbitrary code-execution vulnerability. Failed exploit attempts will result in a denial of service condition.
Pro-face GP-Pro EX 4.07.000 is vulnerable
| VAR-201801-1067 | CVE-2017-9965 | Schneider Electric Pelco VideoXpert Enterprise Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 5.8 Severity: MEDIUM |
An exposure of sensitive information vulnerability exists in Schneider Electric's Pelco VideoXpert Enterprise versions 2.0 and prior. Using a directory traversal attack, an unauthorized person can view web server files. Schneider Electric Pelco VideoXpert Enterprise Contains a path traversal vulnerability.Information may be obtained. PelcoVideoXpertEnterprise is an enterprise video management system.
Exploiting these issues will allow an attacker to bypass security restrictions, execute arbitrary code and perform unauthorized actions. Information harvested may aid in launching further attacks. VideoXpert is a video management solution designed forscalability, fitting the needs surveillance operations of any size.VideoXpert Ultimate can also aggregate other VideoXpert systems,tying multiple video management systems into a single interface.The application is vulnerable to an elevation of privilegesvulnerability which can be used by a simple user that can changethe executable file with a binary of choice. The vulnerability existdue to the improper permissions, with the 'F' flag (full) for the'Users' group, for several binary files. The service is installedby default to start on system boot with LocalSystem privileges.Attackers can replace the binary with their rootkit, and on rebootthey get SYSTEM privileges.<br/><br/>VideoXpert services also suffer from an unquoted search path issueimpacting the 'VideoXpert Core' and 'VideoXpert Exports' servicesfor Windows deployed as part of the VideoXpert Setup bundle. A successful attempt would require the local user to be able to inserttheir code in the system root path undetected by the OS or other securityapplications where it could potentially be executed during applicationstartup or reboot. If successful, the local user’s code would executewith the elevated privileges of the application.Tested on: Microsoft Windows 7 Professional SP1 (EN)