VARIoT IoT vulnerabilities database
| VAR-201705-3673 | CVE-2017-6654 | Cisco Unified Communications Manager of Web -Based scripting interface cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Unified Communications Manager 10.5 through 11.5 could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvc06608. Vendors have confirmed this vulnerability Bug ID CSCvc06608 It is released as.Information may be obtained and information may be altered. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
| VAR-201705-3738 | CVE-2017-6623 | For appliance Cisco Policy Suite Privilege levels in script files installed as part of software distribution root Vulnerability promoted to |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in a script file that is installed as part of the Cisco Policy Suite (CPS) Software distribution for the CPS appliance could allow an authenticated, local attacker to escalate their privilege level to root. The vulnerability is due to incorrect sudoers permissions on the script file. An attacker could exploit this vulnerability by authenticating to the device and providing crafted user input at the CLI, using this script file to escalate their privilege level and execute commands as root. A successful exploit could allow the attacker to acquire root-level privileges and take full control of the appliance. The user has to be logged-in to the device with valid credentials for a specific set of users. The Cisco Policy Suite application is vulnerable when running software versions 10.0.0, 10.1.0, or 11.0.0. Cisco Bug IDs: CSCvc07366. Vendors have confirmed this vulnerability Bug ID CSCvc07366 It is released as.Privilege level by an authenticated local attacker root May be promoted to. The software provides functions such as user-based business rules, real-time management of applications and network resources. The script files in CPS Software versions 10.0.0, 10.1.0, and 11.0.0 have a directory traversal vulnerability
| VAR-201705-4033 | CVE-2017-9025 | HooToo Trip Mate 6 Firmware vshttpd Heap buffer overflow vulnerability |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
Heap buffer overflow in vshttpd (aka ioos) in HooToo Trip Mate 6 (TM6) firmware 2.000.030 and earlier allows remote unauthenticated attackers to control the program counter via a specially crafted HTTP Cookie header. HooTooTripMate6 (TM6) is a portable wireless router from HooToo Corporation of the United States. Vshttpd (aka ioos) is one of the http servers. A heap buffer overflow vulnerability exists in vshttpd in HooTooTM6 firmware 2.000.030 and earlier
| VAR-201705-4034 | CVE-2017-9026 | HooToo Trip Mate 6 Firmware vshttpd Stack buffer overflow vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Stack buffer overflow in vshttpd (aka ioos) in HooToo Trip Mate 6 (TM6) firmware 2.000.030 and earlier allows remote unauthenticated attackers to control the program counter via a specially crafted fname parameter of a GET request. HooTooTripMate6 (TM6) is a portable wireless router from HooToo Corporation of the United States. Vshttpd (aka ioos) is one of the http servers. A stack buffer overflow vulnerability exists in vshttpd in HooTooTM6 firmware 2.000.030 and earlier
| VAR-201705-3653 | CVE-2017-6630 | Cisco IP Phone 8851 of Session Initiation Protocol Service disruption in implementations (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the Session Initiation Protocol (SIP) implementation of Cisco IP Phone 8851 11.0(0.1) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to an abnormal SIP message. An attacker could exploit this vulnerability by manipulating the CANCEL packet. An exploit could allow the attacker to cause a disruption of service to the phone. Cisco Bug IDs: CSCvc34795. Vendors have confirmed this vulnerability Bug ID CSCvc34795 It is released as.Remote attacker could disrupt service operation (DoS) There is a possibility of being put into a state. The Cisco IP Phone8851 is a telephone product that provides video and VoIP communication capabilities from Cisco
| VAR-201705-3654 | CVE-2017-6632 | Cisco FirePOWER System Software management resource management vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the logging configuration of Secure Sockets Layer (SSL) policies for Cisco FirePOWER System Software 5.3.0 through 6.2.2 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources. The vulnerability is due to the logging of certain TCP packets by the affected software. An attacker could exploit this vulnerability by sending a flood of crafted TCP packets to an affected device. A successful exploit could allow the attacker to cause a DoS condition. The success of an exploit is dependent on how an administrator has configured logging for SSL policies for a device. This vulnerability affects Cisco FirePOWER System Software that is configured to log connections by using SSL policy default actions. Cisco Bug IDs: CSCvd07072. Cisco FirePOWER System Software contains resource management vulnerabilities. Vendors have confirmed this vulnerability Bug ID CSCvd07072 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state
| VAR-201705-3655 | CVE-2017-6633 | Cisco UCS C Series rack server TCP Service disruption in throttling process (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the TCP throttling process of Cisco UCS C-Series Rack Servers 3.0(0.234) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient rate-limiting protection. An attacker could exploit this vulnerability by sending a high rate of TCP SYN packets to a specific TCP listening port on an affected device. An exploit could allow the attacker to cause a specific TCP listening port to stop accepting new connections, resulting in a DoS condition. Cisco Bug IDs: CSCva65544. Vendors have confirmed this vulnerability Bug ID CSCva65544 It is released as.Remote attacker could disrupt service operation (DoS) There is a possibility of being put into a state. CiscoUCSC-SeriesRackServers are UCSC series rack servers from Cisco. A denial of service vulnerability exists in TCPthrottlingprocess in the CiscoUCSC-SeriesRackServers 3.0 (0.234) release. Cisco Unified Computing System C-Series Rack Servers are prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users
| VAR-201705-3656 | CVE-2017-6634 |
Cisco Industrial Ethernet 1000 Series Switches Cross-Site Request Forgery Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201705-0077 |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the Device Manager web interface of Cisco Industrial Ethernet 1000 Series Switches 1.3 could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of an affected system. The vulnerability is due to insufficient CSRF protection by the Device Manager web interface. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link or visit an attacker-controlled website. A successful exploit could allow the attacker to submit arbitrary requests to an affected device via the Device Manager web interface and with the privileges of the user. Cisco Bug IDs: CSCvc88811. Vendors have confirmed this vulnerability Bug ID CSCvc88811 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The vulnerability stems from the failure of the program to adequately perform cross-site request forgery protection. Other attacks are also possible
| VAR-201705-3660 | CVE-2017-6641 | Cisco Remote Expert Manager Software TCP Vulnerability related to resource management in connection processing function |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the TCP connection handling functionality of Cisco Remote Expert Manager Software 11.0.0 could allow an unauthenticated, remote attacker to disable TCP ports and cause a denial of service (DoS) condition on an affected system. The vulnerability is due to a lack of rate-limiting functionality in the TCP Listen application of the affected software. An attacker could exploit this vulnerability by sending a crafted TCP traffic stream in which specific types of TCP packets are flooded to an affected device, for example a TCP packet stream in which the TCP FIN bit is set in all the TCP packets. A successful exploit could allow the attacker to cause certain TCP listening ports on the affected system to stop accepting incoming connections for a period of time or until the affected device is restarted, resulting in a DoS condition. In addition, system resources, such as CPU and memory, could be exhausted during the attack. Cisco Bug IDs: CSCva29806. Vendors have confirmed this vulnerability Bug ID CSCva29806 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state.
An attacker can exploit this issue to restart the affected device, denying service to legitimate users. The software features collaboration features such as remote screen sharing, screen annotation, and session recording
| VAR-201705-3661 | CVE-2017-6642 | Cisco Remote Expert Manager Information disclosure vulnerability in software |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the web interface of Cisco Remote Expert Manager Software 11.0.0 could allow an unauthenticated, remote attacker to access sensitive information on an affected system. The vulnerability exists because the affected software does not sufficiently protect sensitive data when responding to HTTP requests that are sent to the web interface of the software. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web interface of the software on an affected system. A successful exploit could allow the attacker to access sensitive information about the software. The attacker could use this information to conduct additional reconnaissance attacks. Cisco Bug IDs: CSCvc52856. Vendors have confirmed this vulnerability Bug ID CSCvc52856 It is released as.Information may be obtained. This may result in further attacks. The software features collaboration features such as remote screen sharing, screen annotation, and session recording
| VAR-201705-3662 | CVE-2017-6643 | Cisco Remote Expert Manager Information disclosure vulnerability in software |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the web interface of Cisco Remote Expert Manager Software 11.0.0 could allow an unauthenticated, remote attacker to access sensitive Virtual Directory information on an affected system. The vulnerability exists because the affected software does not sufficiently protect sensitive data when responding to HTTP requests that are sent to the web interface of the software. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web interface of the software on an affected system. A successful exploit could allow the attacker to access sensitive information about the software. The attacker could use this information to conduct additional reconnaissance attacks. Cisco Bug IDs: CSCvc52858. Vendors have confirmed this vulnerability Bug ID CSCvc52858 It is released as.Information may be obtained. The software features collaboration features such as remote screen sharing, screen annotation, and session recording. The vulnerability stems from the program's insufficient protection of sensitive information
| VAR-201705-3663 | CVE-2017-6644 | Cisco Remote Expert Manager Software Web Vulnerabilities that access important information in the interface |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the web interface of Cisco Remote Expert Manager Software 11.0.0 could allow an unauthenticated, remote attacker to access sensitive information on an affected system. The vulnerability exists because the affected software does not sufficiently protect sensitive data when responding to HTTP requests that are sent to the web interface of the software. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web interface of the software on an affected system. A successful exploit could allow the attacker to access sensitive information about the software. The attacker could use this information to conduct additional reconnaissance attacks. Cisco Bug IDs: CSCvc52860. The software features collaboration features such as remote screen sharing, screen annotation, and session recording. The vulnerability stems from the program's insufficient protection of sensitive information
| VAR-201705-3664 | CVE-2017-6645 | Cisco Remote Expert Manager Information disclosure vulnerability in software |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the web interface of Cisco Remote Expert Manager Software 11.0.0 could allow an unauthenticated, remote attacker to access sensitive Virtual Temporary Directory information on an affected system. The vulnerability exists because the affected software does not sufficiently protect sensitive data when responding to HTTP requests that are sent to the web interface of the software. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web interface of the software on an affected system. A successful exploit could allow the attacker to access sensitive information about the software. The attacker could use this information to conduct additional reconnaissance attacks. Cisco Bug IDs: CSCvc52861. Vendors have confirmed this vulnerability Bug ID CSCvc52861 It is released as.Information may be obtained. The software features collaboration features such as remote screen sharing, screen annotation, and session recording. The vulnerability stems from the program's insufficient protection of sensitive information
| VAR-201705-3665 | CVE-2017-6646 | Cisco Remote Expert Manager Software Web Vulnerability in accessing important order information in the interface |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the web interface of Cisco Remote Expert Manager Software 11.0.0 could allow an unauthenticated, remote attacker to access sensitive Order information on an affected system. The vulnerability exists because the affected software does not sufficiently protect sensitive data when responding to HTTP requests that are sent to the web interface of the software. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web interface of the software on an affected system. A successful exploit could allow the attacker to access sensitive information about the software. The attacker could use this information to conduct additional reconnaissance attacks. Cisco Bug IDs: CSCvc52866 CSCvc52868. The software features collaboration features such as remote screen sharing, screen annotation, and session recording. The vulnerability stems from the program's insufficient protection of sensitive information
| VAR-201705-3666 | CVE-2017-6647 | Cisco Remote Expert Manager Software Web Vulnerability in accessing important temporary file information in the interface |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the web interface of Cisco Remote Expert Manager Software 11.0.0 could allow an unauthenticated, remote attacker to access sensitive Temporary File information on an affected system. The vulnerability exists because the affected software does not sufficiently protect sensitive data when responding to HTTP requests that are sent to the web interface of the software. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web interface of the software on an affected system. A successful exploit could allow the attacker to access sensitive information about the software. The attacker could use this information to conduct additional reconnaissance attacks. Cisco Bug IDs: CSCvc52875. The software features collaboration features such as remote screen sharing, screen annotation, and session recording. The vulnerability stems from the program's insufficient protection of sensitive information
| VAR-201705-3668 | CVE-2017-6649 | Cisco Nexus 5000 Runs on a series switch Cisco NX-OS System software CLI Command injection vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in the CLI of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86787, CSCve60516, CSCve60555. Vendors have confirmed this vulnerability Bug ID CSCvb86787 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple Cisco Products are prone to a local command-injection vulnerability. Cisco NX-OS System Software is a data center operating system running on it
| VAR-201705-3669 | CVE-2017-6650 | Cisco Nexus 5000 Runs on a series switch Cisco NX-OS System software Telnet CLI Command injection vulnerability in commands |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in the Telnet CLI command of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into the Telnet CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86771. Vendors have confirmed this vulnerability Bug ID CSCvb86771 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple Cisco Products are prone to a local command-injection vulnerability. Cisco NX-OS System Software is a data center operating system running on it
| VAR-201705-3164 | CVE-2017-3128 | Fortinet FortiOS Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
A stored XSS (Cross-Site-Scripting) vulnerability in Fortinet FortiOS allows attackers to execute unauthorized code or commands via the policy global-label parameter. FortiOS is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input.
Successful exploits will result in the execution of arbitrary attacker-supplied HTML and script code in the context of the affected application, potentially allowing the attacker to steal cookie-based authentication credentials or control how the page is rendered to the user. Other attacks are also possible. Fortinet FortiOS is a set of security operating systems developed by Fortinet Corporation for the FortiGate network security platform. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSL VPN, Web content filtering and anti-spam. A cross-site scripting vulnerability exists in Fortinet FortiOS
| VAR-201904-0536 | CVE-2017-6047 | Detcon SiteWatch Gateway Authentication vulnerability |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
Detcon Sitewatch Gateway, all versions without cellular, Passwords are presented in plaintext in a file that is accessible without authentication. Detcon Sitewatch Gateway Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. DetconSiteWatchGateway is a gateway device from Detcon Corporation of the United States. An authentication vulnerability exists in DetconSiteWatchGateway. An attacker could exploit the vulnerability to change settings with a specially crafted URL.
Attackers may exploit these issues to execute arbitrary code, gain unauthorized access to restricted content by bypassing intended security restrictions or to obtain sensitive information that may aid in launching further attacks
| VAR-201904-0537 | CVE-2017-6049 | Detcon Sitewatch Gateway Authentication vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Detcon Sitewatch Gateway, all versions without cellular, an attacker can edit settings on the device using a specially crafted URL. Detcon Sitewatch Gateway Contains an authentication vulnerability.Information may be tampered with. DetconSiteWatchGateway is a gateway device from Detcon Corporation of the United States. An authentication vulnerability exists in DetconSiteWatchGateway.
Attackers may exploit these issues to execute arbitrary code, gain unauthorized access to restricted content by bypassing intended security restrictions or to obtain sensitive information that may aid in launching further attacks