VARIoT IoT vulnerabilities database
| VAR-201702-0351 | CVE-2016-4721 | Apple iOS and OS X of IDS - Connection component spoofing call vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. The issue involves the "IDS - Connectivity" component, which allows man-in-the-middle attackers to spoof calls via a "switch caller" notification. Apple iOS and Mac OS are prone to multiple security-bypass vulnerabilities.
Attackers can exploit these issues to bypass security restrictions and perform unauthorized actions. Both Apple iOS and macOS are operating systems of Apple Inc. in the United States. A security vulnerability exists in the IDS-Connectivity component in Apple iOS versions prior to 10.1 and Apple macOS Sierra versions prior to 10.12.1. An attacker could exploit this vulnerability to trick users who are on a multiparty call into believing they are talking to another party
| VAR-201702-0330 | CVE-2016-4670 | Apple iOS and OS X Security component vulnerability that allows arbitrary password lengths to be obtained |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. The issue involves the "Security" component. It allows local users to discover lengths of arbitrary passwords by reading a log. Apple iOS and Mac OS are prone to a local security-bypass vulnerability.
Attackers with physical access to the device can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Both Apple iOS and macOS are operating systems of Apple Inc. in the United States. Apple iOS was developed for mobile devices; macOS was developed for Mac computers. Security vulnerabilities exist in the Security component of Apple iOS versions prior to 10.1 and Apple macOS Sierra versions prior to 10.12.1. An attacker could exploit this vulnerability to obtain the length of a password
| VAR-201808-0041 | CVE-2016-4406 | HPE iLO 3 and iLO 4 Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A remote cross site scripting vulnerability was identified in HPE iLO 3 all version prior to v1.88 and HPE iLO 4 all versions prior to v2.44. HP Integrated Lights-Out is prone to an unspecified cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary HTML and script code in an unsuspecting user's browser in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Versions prior to HP Integrated Lights-Out 4 running firmware 2.44 and HP Integrated Lights-Out 3 running firmware 1.88 are vulnerable. Through an integrated remote management port, Monitor and maintain the running status of the server, remotely manage and control the server, etc. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05337025
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05337025
Version: 1
HPSBHF03675 rev.1 - HPE Integrated Lights-Out 3 and 4 (iLO 3, iLO 4),
Cross-Site Scripting (XSS)
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2016-11-18
Last Updated: 2016-11-18
Potential Security Impact: Remote: Cross-Site Scripting (XSS)
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability was addressed by HPE Integrated Lights-Out
3 and 4. The vulnerability could be remotely exploited to allow Cross-Site
Scripting (XSS).
References:
- CVE-2016-4406 - Cross-Site Scripting (XSS)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
for reporting this vulnerability to security-alert@hpe.com
RESOLUTION
HPE has made the following firmware updates available to resolve the
vulnerability in iLO 3 and iLO 4:
* For iLO3, please upgrade to firmware v1.88
* For iLO4, please upgrade to firmware v2.44
The firmware updates are available at the following location:
<https://www.hpe.com/info/ilo>
HISTORY
Version:1 (rev.1) - 18 November 2016 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBCAAGBQJYL3bfAAoJELXhAxt7SZai1aoIAL92bSUY9rAquo/xSzM8cy0P
dwZuK8ibyor4yVDVhViA6UAvhsjhDpOSlN+akkpod+8uTZ7q8n4saUbmkwxPU1HP
h8GD9OwrMqlP4FM0xjL2Fp5B/yNX3k4LzPFUUhuqUxENm75ZdnXebY0rmb2psk51
y3J8Svy+XwObtduuY/GZaQyvp7Hj6X6e1etkbKD6omRTQL5GmEiW73lXnNTYfIHI
4RMjPt9SvsyTfNPTQIWPv/6G6yJrYtpvBbfml+ljnCpbEK2GQQxzo7PzNszJFhfk
QNnZA/P7qX2aMWtfh2PRVsk/3YWtdnZQtWazXXz/yywDzN/N0IIUhRtd/ETqaAQ=
=Oh1l
-----END PGP SIGNATURE-----
| VAR-201611-0148 | CVE-2016-8222 | ThinkPad system's BIOS Service disruption in signed kernel drivers (DoS) Vulnerabilities |
CVSS V2: 4.7 CVSS V3: 4.4 Severity: MEDIUM |
A vulnerability has been identified in a signed kernel driver for the BIOS of some ThinkPad systems that can allow an attacker with Windows administrator-level privileges to call System Management Mode (SMM) services. This could lead to a denial of service attack or allow certain BIOS variables or settings to be altered (such as boot sequence). The setting or changing of BIOS passwords is not affected by this vulnerability. ) There is a vulnerability that will be modified. ) Is subject to change. LenovoYoga11e and so on are all computer products of China Lenovo. A local security bypass vulnerability exists in several Lenovo ThinkPad products. A local attacker could exploit the vulnerability to bypass security restrictions and perform unauthorized operations. Lenovo Yoga 11e and others are all computer products of Lenovo, a Chinese company. The following products are affected: Lenovo Yoga 11e (Skylake), Lenovo Yoga 11e (Beema), Lenovo ThinkPad Yoga 260 S1, Lenovo ThinkPad Yoga 14 460 S3, Lenovo ThinkPad Yoga 11e (Broadwell)Lenovo ThinkPad Yoga 11e (Beema), Lenovo ThinkPad Yoga 11e, Lenovo ThinkPad X260, Lenovo ThinkPad X250 (Sharkbay), Lenovo ThinkPad X250 (Broadwell), Lenovo ThinkPad X240s, Lenovo ThinkPad X240, etc
| VAR-201611-0422 | No CVE | NETGEAR ADSL Router JNR2010 Module Remote File Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
NETGEARADSLRouter is a router product of NetGear. A remote file disclosure vulnerability exists in the NETGEARADSLRouterJNR20101.0.0.20 version. The program did not fully validate the input provided by the user. An attacker could exploit this vulnerability to view sensitive local files in the context of a web service process, which may be helpful in further attacks.
| VAR-201611-0423 | No CVE | MikroTik RouterOS Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
MikroTikRouterOS is a Linux-based routing operating system developed by MikroTik of Latvia. This system turns a PC into a professional router. A cross-site scripting vulnerability exists in MikroTikRouterOS version 6.36.2. The program did not adequately filter the user-submitted input. An attacker could exploit the vulnerability to steal cookie-based authentication or inject malicious scripts.
| VAR-201704-1027 | CVE-2016-8794 | plural Huawei Vulnerability that crashes the system on smartphones |
CVSS V2: 6.2 CVSS V3: 7.1 Severity: HIGH |
Huawei Mate 8 phones with software Versions before NXT-AL10C00B386, Versions before NXT-CL00C92B386, Versions before NXT-DL00C17B386, Versions before NXT-TL00C01B386; Mate S phones with software Versions before CRR-CL00C92B368, Versions before CRR-CL20C92B368, Versions before CRR-TL00C01B368, Versions before CRR-UL00C00B368, Versions before CRR-UL20C00B368; and P8 phones with software Versions before GRA-TL00C01B366, Versions before GRA-CL00C92B366, Versions before GRA-CL10C92B366, Versions before GRA-UL00C00B366, Versions before GRA-UL10C00B366 allow attackers with graphic or Camera privilege to crash the system or escalate privilege. Huawei Mate 8 , Mate S ,and P8 Smartphones have vulnerabilities that can cause system crashes or elevated privileges.An attacker with graphic or camera privileges could crash the system or elevate privileges. HuaweiMate8, MateS, and P8 are Huawei smartphones. A number of Huawei phones have security vulnerabilities that lack parameter checking. The premise of the exploit is that the attacker gains Graphic or Camera privileges and entice the user to install a malicious application that can use the application to send specific parameters to the phone, resulting in a system reboot or user privilege escalation. Multiple Huawei Smart Phones are prone to multiple local denial-of-service vulnerabilities.
Attackers can exploit these issuee to crash the application, resulting in a denial-of-service condition. The Huawei Mate 8 and others are smartphones from the Chinese company Huawei. The following devices are affected: Huawei Mate 8, Mate S, P8
| VAR-201704-1024 | CVE-2016-8791 | plural Huawei Vulnerability that crashes the system on smartphones |
CVSS V2: 6.2 CVSS V3: 7.1 Severity: HIGH |
Huawei Mate 8 phones with software Versions before NXT-AL10C00B386, Versions before NXT-CL00C92B386, Versions before NXT-DL00C17B386, Versions before NXT-TL00C01B386; Mate S phones with software Versions before CRR-CL00C92B368, Versions before CRR-CL20C92B368, Versions before CRR-TL00C01B368, Versions before CRR-UL00C00B368, Versions before CRR-UL20C00B368; and P8 phones with software Versions before GRA-TL00C01B366, Versions before GRA-CL00C92B366, Versions before GRA-CL10C92B366, Versions before GRA-UL00C00B366, Versions before GRA-UL10C00B366 allow attackers with graphic or Camera privilege to crash the system or escalate privilege. Huawei Mate 8 , Mate S ,and P8 Smartphones have vulnerabilities that can cause system crashes or elevated privileges.An attacker with graphic or camera privileges could crash the system or elevate privileges. HuaweiMate8, MateS, and P8 are Huawei smartphones. A number of Huawei phones have security vulnerabilities that lack parameter checking. The premise of the exploit is that the attacker gains Graphic or Camera privileges and entice the user to install a malicious application that can use the application to send specific parameters to the phone, resulting in a system reboot or user privilege escalation. Multiple Huawei Smart Phones are prone to multiple local denial-of-service vulnerabilities.
Attackers can exploit these issuee to crash the application, resulting in a denial-of-service condition. The Huawei Mate 8 and others are smartphones from the Chinese company Huawei. The following devices are affected: Huawei Mate 8, Mate S, P8
| VAR-201704-1025 | CVE-2016-8792 | plural Huawei Vulnerability that crashes the system on smartphones |
CVSS V2: 6.2 CVSS V3: 7.1 Severity: HIGH |
Huawei Mate 8 phones with software Versions before NXT-AL10C00B386, Versions before NXT-CL00C92B386, Versions before NXT-DL00C17B386, Versions before NXT-TL00C01B386; Mate S phones with software Versions before CRR-CL00C92B368, Versions before CRR-CL20C92B368, Versions before CRR-TL00C01B368, Versions before CRR-UL00C00B368, Versions before CRR-UL20C00B368; and P8 phones with software Versions before GRA-TL00C01B366, Versions before GRA-CL00C92B366, Versions before GRA-CL10C92B366, Versions before GRA-UL00C00B366, Versions before GRA-UL10C00B366 allow attackers with graphic or Camera privilege to crash the system or escalate privilege. Huawei Mate 8 , Mate S ,and P8 Smartphones have vulnerabilities that can cause system crashes or elevated privileges.An attacker with graphic or camera privileges could crash the system or elevate privileges. HuaweiMate8, MateS, and P8 are Huawei smartphones. A number of Huawei phones have security vulnerabilities that lack parameter checking. The premise of the exploit is that the attacker gains Graphic or Camera privileges and entice the user to install a malicious application that can use the application to send specific parameters to the phone, resulting in a system reboot or user privilege escalation. Multiple Huawei Smart Phones are prone to multiple local denial-of-service vulnerabilities.
Attackers can exploit these issuee to crash the application, resulting in a denial-of-service condition. The Huawei Mate 8 and others are smartphones from the Chinese company Huawei. The following devices are affected: Huawei Mate 8, Mate S, P8
| VAR-201704-1026 | CVE-2016-8793 | plural Huawei Vulnerability that crashes the system on smartphones |
CVSS V2: 6.2 CVSS V3: 6.7 Severity: MEDIUM |
Huawei Mate 8 phones with software Versions before NXT-AL10C00B386, Versions before NXT-CL00C92B386, Versions before NXT-DL00C17B386, Versions before NXT-TL00C01B386; Mate S phones with software Versions before CRR-CL00C92B368, Versions before CRR-CL20C92B368, Versions before CRR-TL00C01B368, Versions before CRR-UL00C00B368, Versions before CRR-UL20C00B368; and P8 phones with software Versions before GRA-TL00C01B366, Versions before GRA-CL00C92B366, Versions before GRA-CL10C92B366, Versions before GRA-UL00C00B366, Versions before GRA-UL10C00B366 allow attackers with graphic or Camera privilege to crash the system or escalate privilege. Huawei Mate 8 , Mate S ,and P8 Smartphones contain a vulnerability that can crash the system.An attacker with graphic or camera privileges could crash the system or elevate privileges. HuaweiMate8, MateS, and P8 are Huawei smartphones. A number of Huawei phones have security vulnerabilities that lack parameter checking. The premise of the exploit is that the attacker gains Graphic or Camera privileges and entice the user to install a malicious application that can use the application to send specific parameters to the phone, resulting in a system reboot or user privilege escalation. Multiple Huawei Smart Phones are prone to multiple local denial-of-service vulnerabilities.
Attackers can exploit these issuee to crash the application, resulting in a denial-of-service condition. The Huawei Mate 8 and others are smartphones from the Chinese company Huawei. The following devices are affected: Huawei Mate 8, Mate S, P8
| VAR-201704-0422 | CVE-2016-8797 | plural Huawei Vulnerability that can consume memory in product software |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion. The Huawei AR3200 is a Huawei router. The S9700, S5300, S5700, S6300, S6700, S7700, S9300, and S9700 are Huawei switch devices. A number of Huawei products have a memory leak vulnerability. The Multi-Protocol Labeling (MPLS) packet processing module of the device repeatedly requests the memory when processing abnormal packets. There is a risk that the continuous attack will cause the memory to run out. An attacker could exploit this vulnerability to cause the device to run out of memory. The Huawei AR3200 and others are all products of China's Huawei (Huawei). The following products are affected: Huawei AR3200 V200R007C00 Version, V200R005C32 Version, V200R005C20 Version; S12700 V200R008C00 Version, V200R007C00 Version; S5300 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S5700 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S6300 V200R008C00 Version, V200R007C00 Version; S6700 V200R008C00 version, V200R007C00 version; S7700 V200R008C00 version, V200R007C00 version, V200R006C00 version; S9300 V200R008C00 version, V2007C00 version, V200R006C00 version;
| VAR-201611-0024 | CVE-2016-8561 | SIEMENS SIMATIC CP 1543-1 Device Privilege Escalation Vulnerability |
CVSS V2: 6.0 CVSS V3: 6.6 Severity: MEDIUM |
A vulnerability has been identified in SIMATIC CP 1543-1 (All versions < V2.0.28), SIPLUS NET CP 1543-1 (All versions < V2.0.28). Users with elevated privileges to TIA-Portal and project data on the engineering station could possibly get privileged access on affected devices. SIEMENSSIMATICCP1543-1 is a communication processor that integrates security functions such as firewall, VPN, security protocol, data encryption, etc. It provides network connection and secure communication of s7-1500 controller. A privilege elevation vulnerability exists in the SIEMENSSIMATICCP1543-1 device. A remote attacker exploits the vulnerability to gain access to the affected device through access to TIA-Portal and project-data. Siemens SIMATIC CP 1543-1 is prone to a privilege-escalation vulnerability and a denial-of-service vulnerability. Siemens SIMATIC CP 1543-1 is a controller of Germany's Siemens (Siemens) company that is used to connect communication processors to Ethernet and provides integrated security functions
| VAR-201611-0025 | CVE-2016-8562 | SIEMENS SIMATIC CP 1543-1 Device Denial of Service Vulnerability |
CVSS V2: 3.5 CVSS V3: 7.5 Severity: HIGH |
A vulnerability has been identified in SIMATIC CP 1543-1 (All versions < V2.0.28), SIPLUS NET CP 1543-1 (All versions < V2.0.28). Under special conditions it was possible to write SNMP variables on port 161/udp which should be read-only and should only be configured with TIA-Portal. A write to these variables could reduce the availability or cause a denial-of-service. Siemens SIMATIC CP 1543-1 Is SNMPv3 Write access or SNMPv1 Service operation disruption when is enabled (DoS) There are vulnerabilities that are put into a state.By a remotely authenticated user SNMP Service operation disruption by changing variables (DoS) There is a possibility of being put into a state. SIEMENSSIMATICCP1543-1 is a communication processor that integrates security functions such as firewall, VPN, security protocol, data encryption, etc. It provides network connection and secure communication of s7-1500 controller. A denial of service vulnerability exists in the SIEMENSSIMATICCP1543-1 device. When SNMPv3 write access or SNMPv1 is turned on, an attacker exploits vulnerabilities to modify SNMP variables through the 161/udp port, thereby reducing availability or causing denial of service attacks. Siemens SIMATIC CP 1543-1 is prone to a privilege-escalation vulnerability and a denial-of-service vulnerability.
Attackers can leverage these issues to gain elevated privileges and cause denial-of-service conditions on the affected device. Siemens SIMATIC CP 1543-1 is a controller of Germany's Siemens (Siemens) company that is used to connect communication processors to Ethernet and provides integrated security functions
| VAR-201702-0307 | CVE-2016-8360 | Moxa SoftCMS Vulnerability to change memory area |
CVSS V2: 6.8 CVSS V3: 8.1 Severity: HIGH |
An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. A specially crafted URL request sent to the SoftCMS ASP Webserver can cause a double free condition on the server allowing an attacker to modify memory locations and possibly cause a denial of service or the execution of arbitrary code. Moxa SoftCMS Will change the memory area, disturb service operation (DoS) Vulnerabilities exist that could be put into a state or execute arbitrary code.Denial of service caused by attacker changing memory area (DoS) Could be put into a state or execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Moxa SoftCMS. Authentication is not required to exploit this vulnerability. The specific flaw exists within processing of requests to the web server. A crafted URL can cause a pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute arbitrary code under the context of Administrator. Moxa SoftCMS is a set of central management software developed by Moxa for large-scale monitoring systems. The software supports real-time video surveillance, video playback, and event management. Moxa SoftCMS is prone to multiple security vulnerabilities
| VAR-202001-1213 | CVE-2016-5311 | plural Symantec Uncontrolled search path element vulnerability in product |
CVSS V2: 6.9 CVSS V3: 7.8 Severity: HIGH |
A Privilege Escalation vulnerability exists in Symantec Norton Antivirus, Norton AntiVirus with Backup, Norton Security, Norton Security with Backup, Norton Internet Security, Norton 360, Endpoint Protection Small Business Edition Cloud, and Endpoint Protection Cloud Client due to a DLL-preloading without path restrictions, which could let a local malicious user obtain system privileges. plural Symantec The product is vulnerable to an uncontrolled search path element.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Multiple Symantec Products are prone to a local privilege-escalation vulnerability.
A local attacker can leverage this issue to execute arbitrary code with SYSTEM privileges on a local client system. Failed attempts may lead to denial-of-service conditions. are security series software of Symantec Corporation of the United States
| VAR-201807-0058 | CVE-2016-6564 | Ragentek Android OTA update mechanism vulnerable to MITM attack |
CVSS V2: 9.3 CVSS V3: 8.1 Severity: HIGH |
Android devices with code from Ragentek contain a privileged binary that performs over-the-air (OTA) update checks. Additionally, there are multiple techniques used to hide the execution of this binary. This behavior could be described as a rootkit. This binary, which resides as /system/bin/debugs, runs with root privileges and does not communicate over an encrypted channel. The binary has been shown to communicate with three hosts via HTTP: oyag[.]lhzbdvm[.]com oyag[.]prugskh[.]net oyag[.]prugskh[.]com Server responses to requests sent by the debugs binary include functionalities to execute arbitrary commands as root, install applications, or update configurations. Examples of a request sent by the client binary: POST /pagt/agent?data={"name":"c_regist","details":{...}} HTTP/1. 1 Host: 114.80.68.223 Connection: Close An example response from the server could be: HTTP/1.1 200 OK {"code": "01", "name": "push_commands", "details": {"server_id": "1" , "title": "Test Command", "comments": "Test", "commands": "touch /tmp/test"}} This binary is reported to be present in the following devices: BLU Studio G BLU Studio G Plus BLU Studio 6.0 HD BLU Studio X BLU Studio X Plus BLU Studio C HD Infinix Hot X507 Infinix Hot 2 X510 Infinix Zero X506 Infinix Zero 2 X509 DOOGEE Voyager 2 DG310 LEAGOO Lead 5 LEAGOO Lead 6 LEAGOO Lead 3i LEAGOO Lead 2S LEAGOO Alfa 6 IKU Colorful K45i Beeline Pro 2 XOLO Cube 5.0. This program HTTP Via the next 3 Communicate with one host. 1 * Host: 114.80.68.223 * Connection: Close Example response from the server: * HTTP/1.1 200 OK * {"code": "01", "name": "push_commands", "details": {"server_id": "1" , * "title": "Test Command", "comments": "Test", "commands": "touch /tmp/test"}}Middle man (man-in-the-middle) By attack root An arbitrary command may be executed with authority. Multiple Android products are prone to a security-bypass vulnerability.
Successfully exploiting this issue may allow attackers to bypass certain security restrictions and execute arbitrary commands as root by conducting a man-in-the-middle attack. This may lead to other attacks. Ragentek BLU Studio G etc. are smartphones
| VAR-201611-0334 | CVE-2016-9155 | plural SIEMENS Brand IP Vulnerability to obtain administrator credentials in camera products |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
The following SIEMENS branded IP Camera Models CCMW3025, CVMW3025-IR, CFMW3025 prior to version 1.41_SP18_S1; CCPW3025, CCPW5025 prior to version 0.1.73_S1; CCMD3025-DN18 prior to version v1.394_S1; CCID1445-DN18, CCID1445-DN28, CCID1145-DN36, CFIS1425, CCIS1425, CFMS2025, CCMS2025, CVMS2025-IR, CFMW1025, CCMW1025 prior to version v2635_SP1 could allow an attacker with network access to the web server to obtain administrative credentials under certain circumstances. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. CCMW3025, CVMW3025-IR, CFMW3025, CCPW3025, etc. are IP camera products of SIEMENS. An information disclosure vulnerability exists in SIEMENS-brandedIP-basedCCTVcameras. Multiple Siemens IP CCTV Cameras are prone to an information disclosure vulnerability. Successful exploits may lead to other attacks. The following device models and versions are affected: CCMW3025 prior to 1.41_SP18_S1, CVMW3025-IR prior to 1.41_SP18_S1, CFMW3025 prior to 1.41_SP18_S1, CCPW3025 prior to 0.1.73_S1, CCPW5025 prior to 0.1.73_S1, CCMD18025-DN18025 Versions prior to v1.394_S1, CCID1445-DN18 prior to v2635, CCID1445-DN28 prior to v2635, CCID1445-DN36 prior to v2635, CFIS1425 prior to v2635, CCIS1425 prior to v2635, CFMS2025 prior to v2635, CCMS2025 Versions prior to v2635, versions prior to CVMS2025-IR v2635, versions prior to CFMW1025 v2635, versions prior to CCMW1025 2635
| VAR-201702-0921 | CVE-2016-9333 | Moxa SoftCMS SQL Injection Vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. The SoftCMS Application does not properly sanitize input that may allow a remote attacker access to SoftCMS with administrator's privilege through specially crafted input (SQL INJECTION). Moxa SoftCMS is a set of central management software developed by Moxa for large-scale monitoring systems. The software supports real-time video surveillance, video playback, and event management. An attacker can exploit the vulnerability to run arbitrary code, the application may be denied service conditions due to excessive consumption of resources, access or modify data, or exploit the potential vulnerability in the underlying database to gain database administrator permissions. Moxa SoftCMS is prone to multiple security vulnerabilities. Attackers can exploit this vulnerability to execute arbitrary SQL commands
| VAR-201702-0920 | CVE-2016-9332 |
Moxa SoftCMS input validation vulnerability
Related entries in the VARIoT exploits database: VAR-E-201611-0756 |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. Moxa SoftCMS Webserver does not properly validate input. An attacker could provide unexpected values and cause the program to crash or excessive consumption of resources could result in a denial-of-service condition. Moxa SoftCMS of Web The server does not properly validate the input, resulting in service disruption (DoS) There are vulnerabilities that are put into a state.Denial of service operation by passing an unexpected value by an attacker (DoS) There is a possibility of being put into a state. Moxa SoftCMS is a set of central management software developed by Moxa for large-scale monitoring systems. The software supports real-time video surveillance, video playback, and event management. An attacker exploiting the vulnerability could cause the application to crash. Moxa SoftCMS is prone to multiple security vulnerabilities
| VAR-201701-0411 | CVE-2016-7399 | Veritas NetBackup Appliance scripts/license.pl Vulnerable to arbitrary command execution |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
scripts/license.pl in Veritas NetBackup Appliance 2.6.0.x through 2.6.0.4, 2.6.1.x through 2.6.1.2, 2.7.x through 2.7.3, and 3.0.x allow remote attackers to execute arbitrary commands via shell metacharacters in the hostName parameter to appliancews/getLicense.
An attacker can exploit this issue to execute arbitrary commands in context of the affected application with root privileges. Symantec Veritas NetBackup (NBU) Appliance is an enterprise-level backup management appliance produced by Symantec Corporation of the United States. The scripts/license.pl file in Symantec Veritas NBU Appliance 2.6.x and 2.7.x has a security vulnerability