VARIoT IoT vulnerabilities database
| VAR-201610-0725 | No CVE | AVTECH device has a plaintext storage password vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
AVTECH, founded in 1996, is one of the world's leading manufacturers of CCTV. The main products are monitoring equipment, network cameras, network video recorders and so on. There is a plaintext storage password vulnerability in AVTECH devices. The attacker can use the vulnerability to obtain the user password through command injection or authentication bypass, which constitutes the risk of information leakage.
| VAR-201610-0706 | No CVE | Cross-site request forgery (CSRF) vulnerability exists in AVTECH devices |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
AVTECH, founded in 1996, is one of the world's leading manufacturers of CCTV. The main products are monitoring equipment, network cameras, network video recorders and so on. A cross-site request forgery (CSRF) vulnerability exists in AVTECH devices. The attacker successfully exploited the vulnerability to modify the device configuration.
| VAR-201610-0715 | No CVE | AVTECH device login parameter exists login verification code bypass vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
AVTECH, founded in 1996, is one of the world's leading manufacturers of CCTV. The main products are monitoring equipment, network cameras, network video recorders and so on. There is a login verification code bypass vulnerability in the AVTECH device login parameter. When the login request contains the login=quick parameter, the attacker can use the vulnerability to bypass the verification code and use the brute force method to obtain the system login password.
| VAR-201610-0732 | No CVE | AVTECH device CloudSetup.cgi exists verification command injection vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
AVTECH, founded in 1996, is one of the world's leading manufacturers of CCTV. The main products are monitoring equipment, network cameras, network video recorders and so on. The AVTECH device CloudSetup.cgi has a verification command injection vulnerability. The exefile parameter requested by CloudSetup.cgi executes the specified system command. Since the exefile parameter is not verified or whitelisted, the attacker can exploit the vulnerability to execute any command of the system with root privileges.
| VAR-201610-0287 | CVE-2016-6438 | Cisco cBR-8 Converged Broadband Runs on the router IOS XE In software vty Line configuration integrity vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
A vulnerability in Cisco IOS XE Software running on Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, remote attacker to cause a configuration integrity change to the vty line configuration on an affected device. This vulnerability affects the following releases of Cisco IOS XE Software running on Cisco cBR-8 Converged Broadband Routers: All 3.16S releases, All 3.17S releases, Release 3.18.0S, Release 3.18.1S, Release 3.18.0SP. More Information: CSCuz62815. Known Affected Releases: 15.5(3)S2.9, 15.6(2)SP. Known Fixed Releases: 15.6(1.7)SP1, 16.4(0.183), 16.5(0.1). Vendors have confirmed this vulnerability Bug ID CSCuz62815 It is released as.By a third party vty It may be possible to induce changes in integrity settings for line settings. Cisco IOSXE is an operating system developed by Cisco Systems for its network devices. A remote security bypass vulnerability exists in version 3.18 of Cisco IOSXE. An attacker could exploit the vulnerability to bypass security restrictions and perform unauthorized actions or to initiate further attacks. This may aid in further attacks.
This issue is tracked by Cisco Bug ID CSCuz62815
| VAR-201610-0289 | CVE-2016-6440 | Cisco Unified Communications Manager Vulnerable to a clickjacking attack |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
The Cisco Unified Communications Manager (CUCM) may be vulnerable to data that can be displayed inside an iframe within a web page, which in turn could lead to a clickjacking attack. More Information: CSCuz64683 CSCuz64698. Known Affected Releases: 11.0(1.10000.10), 11.5(1.10000.6), 11.5(0.99838.4). Known Fixed Releases: 11.0(1.22048.1), 11.5(0.98000.1070), 11.5(0.98000.284)11.5(0.98000.346), 11.5(0.98000.768), 11.5(1.10000.3), 11.5(1.10000.6), 11.5(2.10000.2). Vendors have confirmed this vulnerability Bug ID CSCuz64683 and CSCuz64698 It is released as.A clickjacking attack may be performed. Other attacks are also possible.
This issue being tracked by Cisco Bug IDs CSCuz64683 and CSCuz64698. Cisco Unified Communications Manager (CUCM, Unified CM, CallManager) is a call processing component in a unified communication system of Cisco (Cisco). This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution. There is a clickjacking attack vulnerability in CUCM
| VAR-201610-0290 | CVE-2016-6442 | Cisco Finesse Agent and supervisor desktop cross-site request forgery vulnerabilities |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in Cisco Finesse Agent and Supervisor Desktop Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against the user of the web interface. More Information: CSCvb57213. Known Affected Releases: 11.0(1). Cisco Finesse is prone to a cross-site request-forgery vulnerability.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCvb57213. Cisco Finesse is a set of next-generation customer collaboration service solutions from Cisco. The solution supports the integration of traditional contact center functions into agent and management desktops of thin client desktops, as well as quick and easy access to multiple assets and information sources
| VAR-201610-0291 | CVE-2016-6443 | Cisco Prime Infrastructure and Evolved Programmable Network Manager of SQL In the database interface SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the Cisco Prime Infrastructure and Evolved Programmable Network Manager SQL database interface could allow an authenticated, remote attacker to impact system confidentiality by executing a subset of arbitrary SQL queries that can cause product instability. More Information: CSCva27038, CSCva28335. Known Affected Releases: 3.1(0.128), 1.2(400), 2.0(1.0.34A). Vendors have confirmed this vulnerability Bug ID CSCva27038 and CSCva28335 It is released as.Any user that affects the confidentiality of the system by a remotely authenticated user SQL A subset of queries may be executed.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This issue is being tracked by Cisco Bug IDs CSCva27038 and CSCva28335. PI is a set of wireless management solutions through Cisco Prime LAN Management Solution (LMS) and Cisco Prime Network Control System (NCS) technologies; EPNM is a set of network management solutions. A remote attacker can exploit this vulnerability by sending URLs containing malicious SQL statements to the target system to affect system confidentiality, and may also cause denial of service
| VAR-201610-0293 | CVE-2016-6445 | Cisco Meeting Server and Acano Server of XMPP Vulnerability to impersonate a legitimate user in the service |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) service of the Cisco Meeting Server (CMS) before 2.0.6 and Acano Server before 1.8.18 and 1.9.x before 1.9.6 could allow an unauthenticated, remote attacker to masquerade as a legitimate user. This vulnerability is due to the XMPP service incorrectly processing a deprecated authentication scheme. A successful exploit could allow an attacker to access the system as another user. Vendors have confirmed this vulnerability Bug ID CSCvb62741 It is released as.A third party could impersonate a legitimate user. Cisco Meeting Server is prone to an authentication-bypass vulnerability.
An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks.
This issue is tracked by Cisco Bug ID CSCvb62741.
The following products are affected affected:
Cisco Meeting Server Versions prior to 2.0.6 are vulnerable.
Cisco Acano Server Versions prior to 1.8.18 and 1.9.6 are vulnerable
| VAR-201704-0494 | CVE-2016-8759 | plural Huawei Buffer error vulnerability in video driver for smartphone software |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Video driver in Huawei P9 phones with software versions before EVA-AL10C00B192 and Huawei Honor 6 phones with software versions before H60-L02_6.10.1 has a stack overflow vulnerability, which allows attackers to crash the system or escalate user privilege. Huawei P9 , P9 Plus ,and Honor 6 The video driver for smartphone software contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. HuaweiSmartPhones is a smart phone from China Huawei. A number of Huawei smartphone drivers have a heap buffer overflow vulnerability that can be exploited by an attacker to execute arbitrary code on an affected device. Multiple Huawei Smart Phones drivers are prone to stack-based buffer overflow and heap-based buffer overflow vulnerabilities. Failed exploit attempts will result in denial-of-service conditions.
Huawei P9 versions prior to EVA-AL10C00B192 are vulnerable.
Honor 6 versions prior to H60-L02_6.10.1 are vulnerable. Huawei Smart Phones P9 is a smartphone from the Chinese company Huawei. video driver is one of the video drivers. Attackers can exploit this vulnerability to crash the system or elevate privileges by enticing users to install malicious applications and send specific parameters to the video driver
| VAR-201704-0495 | CVE-2016-8760 | plural Huawei Buffer error vulnerability in touchscreen driver of smartphone software |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Touchscreen driver in Huawei P9 phones with software versions before EVA-AL10C00B192 and Huawei Honor 6 phones with software versions before H60-L02_6.10.1 has a heap overflow vulnerability, which allows attackers to crash the system or escalate user privilege. Huawei P9 , P9 Plus ,and Honor 6 A buffer error vulnerability exists in the touch screen driver of the smartphone software.Information is acquired, information is falsified, and denial of service (DoS) An attack could be made. HuaweiSmartPhones is a smart phone from China Huawei. A number of Huawei smartphone drivers have a heap buffer overflow vulnerability that can be exploited by an attacker to execute arbitrary code on an affected device. Multiple Huawei Smart Phones drivers are prone to stack-based buffer overflow and heap-based buffer overflow vulnerabilities. Failed exploit attempts will result in denial-of-service conditions.
Huawei P9 versions prior to EVA-AL10C00B192 are vulnerable.
Honor 6 versions prior to H60-L02_6.10.1 are vulnerable. Huawei Smart Phones P9 is a smartphone from the Chinese company Huawei. Tothscreen is one of the touch screen drivers. Attackers can exploit this vulnerability to crash the system or elevate privileges by enticing users to install malicious applications and sending specific parameters to the touthscreen driver
| VAR-201704-0496 | CVE-2016-8761 | plural Huawei Buffer error vulnerability in video driver for smartphone software |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Video driver in Huawei P9 phones with software versions before EVA-AL10C00B192 and Huawei Honor 6 phones with software versions before H60-L02_6.10.1 has a stack overflow vulnerability, which allows attackers to crash the system or escalate user privilege. Huawei P9 , P9 Plus ,and Honor 6 The video driver for smartphone software contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. HuaweiSmartPhones is a smart phone from China Huawei. A number of Huawei smartphone drivers have a heap buffer overflow vulnerability that can be exploited by an attacker to execute arbitrary code on an affected device. Multiple Huawei Smart Phones drivers are prone to stack-based buffer overflow and heap-based buffer overflow vulnerabilities. Failed exploit attempts will result in denial-of-service conditions.
Huawei P9 versions prior to EVA-AL10C00B192 are vulnerable.
Honor 6 versions prior to H60-L02_6.10.1 are vulnerable. Huawei Smart Phones P9 is a smartphone from the Chinese company Huawei. video driver is one of the video drivers. Attackers can exploit this vulnerability to crash the system or elevate privileges by enticing users to install malicious applications and send specific parameters to the video driver
| VAR-201710-0044 | CVE-2016-4925 | JUNOSe Data processing vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Receipt of a specifically malformed IPv6 packet processed by the router may trigger a line card reset: processor exception 0x68616c74 (halt) in task: scheduler. The line card will reboot and recover without user interaction. However, additional specifically malformed packets may cause follow-on line card resets and lead to an extended service outage. This issue only affects E Series routers with IPv6 licensed and enabled. Routers not configured to process IPv6 traffic are unaffected by this vulnerability. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. No other Juniper Networks products or platforms are affected by this issue. JUNOSe Contains a data processing vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state.
An attacker can exploit this issue to cause a denial-of-service condition. Juniper E Series routers is a router device of Juniper Networks (Juniper Networks)
| VAR-201710-0047 | CVE-2016-4921 | Juniper Networks Junos OS Resource management vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
By flooding a Juniper Networks router running Junos OS with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. In extreme cases, the crafted IPv6 traffic may result in a total resource exhaustion and kernel panic. The issue is triggered by traffic destined to the router. Transit traffic does not trigger the vulnerability. This issue only affects devices with IPv6 enabled and configured. Devices not configured to process IPv6 traffic are unaffected by this vulnerability. This issue was found during internal product security testing. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. Affected releases are Juniper Networks Junos OS 11.4 prior to 11.4R13-S3; 12.3 prior to 12.3R3-S4; 12.3X48 prior to 12.3X48-D30; 13.3 prior to 13.3R10, 13.3R4-S11; 14.1 prior to 14.1R2-S8, 14.1R4-S12, 14.1R8; 14.1X53 prior to 14.1X53-D28, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R3-S10, 14.2R4-S7, 14.2R6; 15.1 prior to 15.1F2-S5, 15.1F5-S2, 15.1F6, 15.1R3; 15.1X49 prior to 15.1X49-D40; 15.1X53 prior to 15.1X53-D57, 15.1X53-D70. Juniper Networks Junos OS Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state.
An attacker may exploit this issue to exhaust the resources, resulting in a denial-of-service condition. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK. The following releases are affected: Juniper Junos OS Release 11.4, Release 12.3, Release 12.3X48, Release 13.3, Release 14.1, Release 14.1X53, Release 14.1X55, Release 14.2, Release 15.1, Release 15.1X49, Release 15.1X53
| VAR-201710-0043 | CVE-2016-4924 | Juniper Networks Junos OS Permissions vulnerability |
CVSS V2: 1.7 CVSS V3: 5.5 Severity: MEDIUM |
An incorrect permissions vulnerability in Juniper Networks Junos OS on vMX may allow local unprivileged users on a host system read access to vMX or vPFE images and obtain sensitive information contained in them such as private cryptographic keys. This issue was found during internal product security testing. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS 15.1 prior to 15.1F5; 14.1 prior to 14.1R8.
Attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions. Junos OS is the operating system that runs on it
| VAR-201710-0042 | CVE-2016-4923 | Juniper Networks Junos OS Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Insufficient cross site scripting protection in J-Web component in Juniper Networks Junos OS may potentially allow a remote unauthenticated user to inject web script or HTML and steal sensitive data and credentials from a J-Web session and to perform administrative actions on the Junos device. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. Affected releases are Juniper Networks Junos OS 11.4 prior to 11.4R13-S3; 12.1X44 prior to 12.1X44-D60; 12.1X46 prior to 12.1X46-D40; 12.1X47 prior to 12.1X47-D30; 12.3 prior to 12.3R11; 12.3X48 prior to 12.3X48-D20; 13.2X51 prior to 13.2X51-D39, 13.2X51-D40; 13.3 prior to 13.3R9; 14.1 prior to 14.1R6; 14.2 prior to 14.2R6; 15.1 prior to 15.1R3; 15.1X49 prior to 15.1X49-D20; 15.1X53 prior to 15.1X53-D57. Juniper Networks Junos OS Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Juniper Junos is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK. J-Web is one of the network management tools. The following versions are affected: Juniper Junos OS Release 11.4, Release 12.1X44, Release 12.1X46, Release 12.1X47, Release 12.3, Release 12.3X48, Release 13.2X51, Release 13.3, Release 14.1, Release 14.2, Release 15.1, Release 15.1X49, 15.1X53 version
| VAR-201710-0041 | CVE-2016-4922 | Juniper Networks Junos OS Command injection vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Certain combinations of Junos OS CLI commands and arguments have been found to be exploitable in a way that can allow unauthorized access to the operating system. This may allow any user with permissions to run these CLI commands the ability to achieve elevated privileges and gain complete control of the device. Affected releases are Juniper Networks Junos OS 11.4 prior to 11.4R13-S3; 12.1X46 prior to 12.1X46-D60; 12.1X47 prior to 12.1X47-D45; 12.3 prior to 12.3R12; 12.3X48 prior to 12.3X48-D35; 13.2 prior to 13.2R9; 13.3 prior to 13.3R4-S11, 13.3R9; 14.1 prior to 14.1R4-S12, 14.1R7; 14.1X53 prior to 14.1X53-D28, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R3-S10, 14.2R4-S7, 14.2R5; 15.1 prior to 15.1F4, 15.1R3; 15.1X49 prior to 15.1X49-D60; 15.1X53 prior to 15.1X53-D57, 15.1X53-D70. Juniper Networks Junos OS Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Juniper Junos is prone to multiple local privilege-escalation vulnerabilities.
A local attacker can exploit these issues to gain elevated privileges. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Juniper Junos OS. The following versions are affected: Juniper Networks Junos OS Release 11.4, Release 12.1X46, Release 12.1X47, Release 12.3, Release 12.3X48, Release 13.2, Release 13.3, Release 14.1, Release 14.1X53, Release 14.1X55, Release 14.2, Release 15.1, 15.1X49 version, 15.1X53 version
| VAR-201703-0042 | CVE-2016-4930 | Junos Space Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Junos Space before 15.2R2 allows remote attackers to steal sensitive information or perform certain administrative actions. Juniper Junos Space is prone to the following multiple security issues:
1. Cross-site scripting vulnerability
2. Cross-site request-forgery vulnerability
3. Authentication-bypass vulnerability
4. An XML external entity injection vulnerability
5. A command-injection vulnerability
6. A security-bypass vulnerability
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, execute arbitrary commands in the context of the application, perform certain administrative actions, gain unauthorized access, bypass certain security restrictions or cause denial-of-service conditions. Juniper Networks Junos Space is a set of network management solutions of Juniper Networks (Juniper Networks). The solution supports automated configuration, monitoring, and troubleshooting of devices and services throughout their lifecycle
| VAR-201703-0043 | CVE-2016-4931 | Junos Space In XML External entity vulnerabilities |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
XML entity injection in Junos Space before 15.2R2 allows attackers to cause a denial of service. Juniper Junos Space is prone to the following multiple security issues:
1. Cross-site scripting vulnerability
2. Cross-site request-forgery vulnerability
3. Authentication-bypass vulnerability
4. A command-injection vulnerability
6. A security-bypass vulnerability
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, execute arbitrary commands in the context of the application, perform certain administrative actions, gain unauthorized access, bypass certain security restrictions or cause denial-of-service conditions. Juniper Networks Junos Space is a set of network management solutions of Juniper Networks (Juniper Networks). The solution supports automated configuration, monitoring, and troubleshooting of devices and services throughout their lifecycle
| VAR-201703-0041 | CVE-2016-4929 | Junos Space Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Command injection vulnerability in Junos Space before 15.2R2 allows attackers to execute arbitrary code as a root user. Juniper Junos Space is prone to the following multiple security issues:
1. Cross-site scripting vulnerability
2. Cross-site request-forgery vulnerability
3. Authentication-bypass vulnerability
4. An XML external entity injection vulnerability
5. A command-injection vulnerability
6. A security-bypass vulnerability
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, execute arbitrary commands in the context of the application, perform certain administrative actions, gain unauthorized access, bypass certain security restrictions or cause denial-of-service conditions. Juniper Networks Junos Space is a set of network management solutions of Juniper Networks (Juniper Networks). The solution supports automated configuration, monitoring, and troubleshooting of devices and services throughout their lifecycle