VARIoT IoT vulnerabilities database
| VAR-201801-0229 | CVE-2017-2741 | HP PageWide Printer and OfficeJet Pro Access control vulnerability in printer firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A potential security vulnerability has been identified with HP PageWide Printers, HP OfficeJet Pro Printers, with firmware before 1708D. This vulnerability could potentially be exploited to execute arbitrary code. HP PageWide Printer and OfficeJet Pro The printer firmware contains an access control vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. The HP Officejet 8500A is a print/copy/scan/fax MFP from HP
| VAR-201703-0733 | CVE-2017-5623 | OnePlus 3 and 3T Run on device OxygenOS Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 7.2 CVSS V3: 6.6 Severity: MEDIUM |
An issue was discovered in OxygenOS before 4.1.0 on OnePlus 3 and 3T devices. The attacker can change the bootmode of the device by issuing the 'fastboot oem boot_mode {rf/wlan/ftm/normal} command' in contradiction to the threat model of Android where the bootloader MUST NOT allow any security-sensitive operation to be run unless the bootloader is unlocked. OnePlus 3 and 3T Run on device OxygenOS Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. OnePlus OxygenOS is prone to a local security-bypass vulnerability.
An attacker may exploit this issue to bypass certain security restrictions and perform unauthorized actions.
Versions prior to OnePlus OxygenOS 4.1.0 are vulnerable
| VAR-201703-1342 | CVE-2017-6864 | Siemens RUGGEDCOM ROX I Port 10000/TCP Integration Web Server cross-site scripting vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
The integrated web server in Siemens RUGGEDCOM ROX I (all versions) at port 10000/TCP could allow an authenticated user to perform stored Cross-Site Scripting attacks. SiemensRuggedCom's ROX-based firewall devices are used to connect devices in harsh environments such as substations, traffic management chassis, and more. Siemens RUGGEDCOM ROX I is prone to the following security vulnerabilities: :
1. A HTML-injection vulnerability
2. An information-disclosure vulnerability
4. An authorization-bypass vulnerability
5. A cross-site request-forgery vulnerability
An attacker may leverage these issues to execute HTML and script code in the browser of an unsuspecting user in the context of the affected site, disclose sensitive information, perform certain unauthorized actions actions, gain unauthorized access, or bypass certain security restrictions
| VAR-201705-3973 | CVE-2017-6865 | plural Siemens Service disruption in products (DoS) Vulnerabilities |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC Automation Tool (All versions < V3.0), SIMATIC NET PC-Software (All versions < V14 SP1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1), SIMATIC STEP 7 V5.X (All versions < V5.6), SIMATIC WinAC RTX 2010 SP2 (All versions), SIMATIC WinAC RTX F 2010 SP2 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1), SIMATIC WinCC V7.2 and prior (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Update 15), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd1), SIMATIC WinCC flexible 2008 (All versions < flexible 2008 SP5), SINAUT ST7CC (All versions installed in conjunction with SIMATIC WinCC < V7.3 Update 15), SINEMA Server (All versions < V14), SINUMERIK 808D Programming Tool (All versions < V4.7 SP4 HF2), SMART PC Access (All versions < V2.3), STEP 7 - Micro/WIN SMART (All versions < V2.3), Security Configuration Tool (SCT) (All versions < V5.0). Specially crafted PROFINET DCP broadcast packets sent to the affected products on a local Ethernet segment (Layer 2) could cause a Denial-of-Service condition of some services. The services require manual restart to recover. SIMATIC WinCC (TIA Portal), SIMATIC STEP 7, SMART PC Access, SIMATIC Automation Tool, etc. are all industrial automation products from Siemens AG. A number of Siemens industrial products have a denial of service vulnerability.
Attackers can exploit this issue to crash the affected device, denying service to legitimate users. Siemens SIMATIC WinCC, etc. Siemens SIMATIC WinCC is an automated data acquisition and monitoring (SCADA) system; SIMATIC PCS 7 is a distributed process control system using WinCC
| VAR-201708-1505 | CVE-2017-6866 | Siemens XHQ Server permission vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability was discovered in Siemens XHQ server 4 and 5 (4 before V4.7.1.3 and 5 before V5.0.0.2) that could allow an authenticated low-privileged remote user to gain read access to data in the XHQ solution exceeding his configured permission level. Siemens XHQ The server contains a permission vulnerability.Information may be obtained. XHQ Production Operations Intelligence is Siemens Energy's flagship solution and is widely deployed in the world's largest oil and gas and chemical companies. A privilege elevation vulnerability exists in Siemens XHQ 4 and XHQ 5.
Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions.
The following versions are affected:
Siemens XHQ all versions prior to 4.7.1.3
Siemens XHQ all versions prior to 5.0.0.2
| VAR-201705-3974 | CVE-2017-6867 | plural Siemens SIMATIC Vulnerability that can crash services in products |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
A vulnerability was discovered in Siemens SIMATIC WinCC (V7.3 before Upd 11 and V7.4 before SP1), SIMATIC WinCC Runtime Professional (V13 before SP2 and V14 before SP1), SIMATIC WinCC (TIA Portal) Professional (V13 before SP2 and V14 before SP1) that could allow an authenticated, remote attacker who is member of the "administrators" group to crash services by sending specially crafted messages to the DCOM interface. Siemens SIMATIC WinCC and SIMATIC WinCC Runtime Professional are industrial automation products from Siemens AG. SIMATIC WinCC is a monitoring and data acquisition (SCADA) system. SIMATIC WinCC Runtime Professional is the control and monitoring of the operator's visual runtime platform machines and equipment. Multiple SIMATIC WinCC Products are prone to a denial-of-service vulnerability.
The following products are vulnerable:
SIMATIC WinCC 7.3 versions prior to 7.3 Update 11
SIMATIC WinCC 7.4 versions prior to 7.4 SP1
SIMATIC WinCC Runtime Professional 13 versions prior to 13 SP2
SIMATIC WinCC Runtime Professional 14 versions prior to 14 SP1
SIMATIC WinCC (TIA Portal) Professional 13 versions prior to 13 SP2
SIMATIC WinCC (TIA Portal) Professional 14 versions prior to 14 SP1. Siemens SIMATIC WinCC, etc. Siemens SIMATIC WinCC is an automated data acquisition and monitoring (SCADA) system; SIMATIC PCS 7 is a distributed process control system using WinCC. Security vulnerabilities exist in several Siemens products
| VAR-201707-1137 | CVE-2017-6868 | Siemens SIMATIC CP 44x-1 RNA In RNA Series module CP Vulnerability to perform administrator operations on |
CVSS V2: 6.8 CVSS V3: 8.1 Severity: HIGH |
An Improper Authentication issue was discovered in Siemens SIMATIC CP 44x-1 RNA, all versions prior to 1.4.1. An unauthenticated remote attacker may be able to perform administrative actions on the Communication Process (CP) of the RNA series module, if network access to Port 102/TCP is available and the configuration file for the CP is stored on the RNA's CPU. The SiemensSIMATICCP44x-1RNA is a communications processor that integrates security functions such as firewall, VPN, security protocol, data encryption, etc., providing network connectivity and secure communication for the s7-1500 controller. An unauthorized operating vulnerability exists in the pre-1.4.1 version of the Siemens SIMATICCP44x-1RNA module. Siemens SIMATIC CP 44x-1 Redundant is prone to an authentication-bypass vulnerability.
An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks
| VAR-201708-1507 | CVE-2017-6870 | Siemens SIMATIC WinCC Sm@rtClient for Android Man-in-the-middle attack vulnerability |
CVSS V2: 5.8 CVSS V3: 7.4 Severity: HIGH |
A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data within a TLS session while performing a Man-in-the-Middle (MitM) attack. Siemens SIMATIC WinCC Sm@rtClient for Android is a client program on Android. Siemens SIMATIC is an automation software in a single engineering environment. A security-bypass vulnerability
2. A local authentication-bypass vulnerability
An attacker may leverage these issues to disclose sensitive information, perform certain unauthorized actions by conducting a man-in-the-middle attack, gain unauthorized access
| VAR-201708-1508 | CVE-2017-6871 | Siemens SIMATIC WinCC Sm@rtClient for Android Authentication Bypass Vulnerability |
CVSS V2: 4.6 CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2) and SIMATIC WinCC Sm@rtClient for Android Lite (All versions before V1.0.2.2). An attacker with physical access to an unlocked mobile device, that has the affected app running, could bypass the app's authentication mechanism under certain conditions. Android for Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Siemens SIMATIC WinCC Sm@rtClient for Android is a client program on Android. Siemens SIMATIC is an automation software in a single engineering environment. A security-bypass vulnerability
2. A local authentication-bypass vulnerability
An attacker may leverage these issues to disclose sensitive information, perform certain unauthorized actions by conducting a man-in-the-middle attack, gain unauthorized access
| VAR-201708-1509 | CVE-2017-6872 | Siemens OZW672 and OZW772 Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker with access to port 21/tcp to access or alter historical measurement data stored on the device. Siemens OZW672 and OZW772 Contains vulnerabilities related to authorization, permissions, and access control.Information may be obtained and information may be altered. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. There are data read and write vulnerabilities in Siemens OZW672 and OZW772.
An attacker can exploit these issues to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks. A security vulnerability exists in Siemens OZW672 and OZW772 devices
| VAR-201703-1378 | No CVE | Dahua Technology Camera Products Unauthorized Access Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
DH-IPC-HDW23A0RN-ZS, DH-IPC-HFW13A0SN-W, DHI-HCVR51A04HE-S3, etc. are various camera products of Dahua Technology. Unauthorized access vulnerability exists in Dahua Technology's camera products, allowing an attacker to access the user database of the camera product without administrator rights, extracting the user name and hash password, and directly logging in to the camera using the username and hash password. Get the relevant permissions for this camera.
| VAR-201704-1633 | No CVE | Ubiquiti Networking product multiple command injection vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
UbiquitiNetworksTS-8-PRO and others are products developed by Ubiquiti Networks. The TS-8-PRO is a switch. There are multiple command injection vulnerabilities in the UbiquitiNetworking product. The vulnerability is caused by the failure to validate the data submitted by the user. An attacker can exploit a vulnerability to inject arbitrary commands into the target application context and can also cause a denial of service. Ubiquiti Networking Products is prone to multiple command-injection vulnerabilities because it fails to properly sanitize user-supplied input. Failed exploit attempts will result in a denial-of-service condition
| VAR-201708-1506 | CVE-2017-6869 | Siemens ViewPort for Web Office Portal Remote code execution vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability was discovered in Siemens ViewPort for Web Office Portal before revision number 1453 that could allow an unauthenticated remote user to upload arbitrary code and execute it with the permissions of the operating-system user running the web server by sending specially crafted network packets to port 443/TCP or port 80/TCP. Siemens ViewPort for Web Office Portal Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Web Office Portal provides authorized users to retrieve current data from the Control Center solution Spectrum PowerTM in a read-only manner
| VAR-201708-1510 | CVE-2017-6873 | Siemens OZW672 and OZW772 Cryptographic vulnerability |
CVSS V2: 5.8 CVSS V3: 7.4 Severity: HIGH |
A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp. Siemens OZW672 and OZW772 Contains a cryptographic vulnerability.Information may be obtained and information may be altered. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. There is a man-in-the-middle attack vulnerability in Siemens OZW672 and OZW772. Multiple Siemens OZW672 and OZW772 are prone to multiple authentication-bypass vulnerabilities.
An attacker can exploit these issues to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks
| VAR-201703-0896 | CVE-2017-3868 | Cisco UCS Director of Web -Based scripting interface cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco UCS Director could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. More Information: CSCvc44344. Known Affected Releases: 6.0(0.0).
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCvc44344. Cisco UCS Director (formerly known as Cisco Cloupia) is a set of converged infrastructure management solutions from Cisco. The solution supports users to manage computing power, network services, storage, and virtual machines from a single management console to deploy and release IT services more quickly and at low cost
| VAR-201907-1126 | CVE-2017-6900 | riello-ups of netman 204 Certificate and password management vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered in Riello NetMan 204 14-2 and 15-2. The issue is with the login script and wrongpass Python script used for authentication. When calling wrongpass, the variables $VAL0 and $VAL1 should be enclosed in quotes to prevent the potential for Bash command injection. Further to this, VAL0 and VAL1 should be sanitised to ensure they do not contain malicious characters. Passing it the username of '-' will cause it to time out and log the user in because of poor error handling. This will log the attacker in as an administrator where the telnet / ssh services can be enabled, and the credentials for local users can be reset. Also, login.cgi accepts the username as a GET parameter, so login can be achieved by browsing to the /cgi-bin/login.cgi?username=-%20a URI. riello-ups of netman 204 The firmware contains vulnerabilities regarding certificate and password management.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. RIELLO UPS NetMan is a network adapter produced by Italy RIELLO UPS company. A security vulnerability exists in Riello NetMan 204 versions 14-2 and 15-2
| VAR-201712-0128 | CVE-2017-3191 | D-Link DIR-130 and DIR-330 are vulnerable to authentication bypass and do not protect credentials |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-130 firmware version 1.23 and DIR-330 firmware version 1.12 are vulnerable to authentication bypass of the remote login page. A remote attacker that can access the remote management login page can manipulate the POST request in such a manner as to access some administrator-only pages such as tools_admin.asp without credentials. Insufficient authentication information protection (CWE-522) - CVE-2017-3192 tools_admin.asp The page contains the password for the administrator account Base64 Included in encoded form. CVE-2017-3191 It is possible for a remote third party to obtain authentication information for an administrator account on the device by using a vulnerability to avoid authentication.There is a possibility that an administrator account authentication information on the device will be obtained by a remote third party and the management function will be operated. D-LinkDIR-130 and DIR-330 are both D-Link wireless router products
| VAR-201703-0885 | CVE-2017-3872 | Cisco Unified Communications Manager of Web -Based scripting interface cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A cross-site scripting (XSS) filter bypass vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct XSS attacks against a user of an affected device. More Information: CSCvc21620. Known Affected Releases: 10.5(2.14076.1). Known Fixed Releases: 12.0(0.98000.641) 12.0(0.98000.500) 12.0(0.98000.219).
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCvc21620. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
| VAR-201703-0890 | CVE-2017-3879 | Cisco Nexus 9000 Runs on a series switch Cisco NX-OS Service operation interruption in the remote login function of software (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A Denial of Service vulnerability in the remote login functionality for Cisco NX-OS Software running on Cisco Nexus 9000 Series Switches could allow an unauthenticated, remote attacker to cause a process used for login to terminate unexpectedly and the login attempt to fail. There is no impact to user traffic flowing through the device. The attacker could use either a Telnet or an SSH client for the remote login attempt. Affected Products: This vulnerability affects Cisco Nexus 9000 Series Switches that are running Cisco NX-OS Software and are configured to allow remote Telnet connections to the device. More Information: CSCuy25824. Known Affected Releases: 7.0(3)I3(1) 8.3(0)CV(0.342) 8.3(0)CV(0.345). Known Fixed Releases: 8.3(0)CV(0.362) 8.0(1) 7.0(3)IED5(0.19) 7.0(3)IED5(0) 7.0(3)I4(1) 7.0(3)I4(0.8) 7.0(3)I2(2e) 7.0(3)F1(1.22) 7.0(3)F1(1) 7.0(3)F1(0.230). Vendors have confirmed this vulnerability Bug ID CSCuy25824 It is released as.Remote attacker could disrupt service operation (DoS) There is a possibility of being put into a state. The Cisco Nexus 9000 Series Switches are the 9000 Series switches from Cisco Systems, USA. Cisco NX-OS Software is prone to a denial-of-service vulnerability
An attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users.
This issue is being tracked by Cisco bug ID CSCuy25824
| VAR-201704-1556 | CVE-2017-6884 |
ZyXEL EMG2926 Command injection vulnerability in home router firmware
Related entries in the VARIoT exploits database: VAR-E-201704-0138 |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.00(AAQT.4)b8. The vulnerability is located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute arbitrary commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI. ZyXELEMG2926 is a router manufactured by ZyXEL. Because the nslookup function is not fully filtered, an unauthenticated attacker is allowed to execute arbitrary code remotely