VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201610-0501 CVE-2016-1000009 TP-LINK Technologies  of  tp-link  Vulnerabilities in security features CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
TP-LINK lost control of two domains, www.tplinklogin.net and tplinkextender.net. Please note that these domains are physically printed on many of the devices. TP-LINK Technologies of tp-link contains a vulnerability in the security functions.Information may be tampered with. TP-LINK (Pulian) is a network communication equipment company in China. There is a security vulnerability in TP-LINK that stems from the loss of control over the domain names (www.tplinklogin.net and tplinkextender.net). Please pay attention to the authenticity of this domain name
VAR-201610-0283 CVE-2016-6434 Cisco Firepower Management Center Vulnerability in which important information is obtained CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Cisco Firepower Management Center 6.0.1 has hardcoded database credentials, which allows local users to obtain sensitive information by leveraging CLI access, aka Bug ID CSCva30370. An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks. This issue being tracked by Cisco Bug ID CSCva30370
VAR-201610-0284 CVE-2016-6435 Cisco Firepower Management Center of Web Vulnerability in console to read arbitrary files CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
The web console in Cisco Firepower Management Center 6.0.1 allows remote authenticated users to read arbitrary files via crafted parameters, aka Bug ID CSCva30376. An attacker can exploit this vulnerability to obtain potentially sensitive information or to execute arbitrary local scripts in the context of the web server process. This may allow the attacker to compromise the application and the computer; other attacks are also possible
VAR-201610-0285 CVE-2016-6436 Cisco Host Scan HostScan Engine Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in HostScan Engine 3.0.08062 through 3.1.14018 in the Cisco Host Scan package, as used in ASA Web VPN, allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuz14682. CiscoAdaptiveSecurityAppliancesWebVPN is a set of modules for configuring WebVPN on the ASA firewall. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco Bug ID CSCuz14682. HostScan Engine is a host scanning engine
VAR-201610-0277 CVE-2016-6426 Cisco Unified Contact Center Express Used in Unified Intelligence Center Vulnerable to user account creation CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
The j_spring_security_switch_user function in Cisco Unified Intelligence Center (CUIC) 8.5.4 through 9.1(1), as used in Unified Contact Center Express 10.0(1) through 11.0(1), allows remote attackers to create user accounts by visiting an unspecified web page, aka Bug IDs CSCuy75027 and CSCuy81653. Vendors have confirmed this vulnerability Bug ID CSCuy75027 ,and CSCuy81653 It is released as.Unspecified by a third party Web By accessing the page, a user account may be created. Successful exploits may allow an attacker to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. This issue is tracked by Cisco Bug IDs CSCuy75027 and CSCuy81653. Unified CCX is a customer relationship management component in a unified communication solution; CUIC is a set of web-based reporting platform. A remote attacker could exploit this vulnerability by visiting a page to create user accounts
VAR-201610-0340 CVE-2016-1455 Cisco NX-OS Vulnerability in which important information is obtained CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Cisco NX-OS before 7.0(3)I2(2e) and 7.0(3)I4 before 7.0(3)I4(1) has an incorrect iptables local-interface configuration, which allows remote attackers to obtain sensitive information via TCP or UDP traffic, aka Bug ID CSCuz05365. Cisco NX-OS Is illegal iptables There is a vulnerability in which important information is obtained because it has a local interface setting. Cisco NX-OS is a data center-class operating system from Cisco Systems, Inc. that reflects modular design, resiliency, and maintainability. Cisco Nexus 9000 Series switches running on NX-OS are prone to an information-disclosure vulnerability. This may result in further attacks. This issue is being tracked by Cisco Bug ID CSCuz05365
VAR-201610-0274 CVE-2016-6423 Cisco IOS and IOS XE of IKEv2 Service disruption in client and initiator implementations (DoS) Vulnerabilities CVSS V2: 6.3
CVSS V3: 6.5
Severity: MEDIUM
The IKEv2 client and initiator implementations in Cisco IOS 15.5(3)M and IOS XE allow remote IKEv2 servers to cause a denial of service (device reload) via crafted IKEv2 packets, aka Bug ID CSCux97540. Cisco IOSXE is Cisco's next-generation network operator routing system, a fully modular and fully distributed network interconnection operating system. Cisco IOS and IOS XE Software are prone to a denial-of-service vulnerability. This issue is being tracked by Cisco Bug ID CSCux97540
VAR-201610-0690 No CVE Nanjing Shuntang Industrial Control Configuration Software QTouch Remote Denial of Service Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Nanjing Shuntang Industrial Control Configuration Software QTouch is the leader and leader in the second generation of domestic configuration software, spanning multiple operating systems and multiple CPU platforms. There is a remote denial of service vulnerability in Nanjing Shuntang Industrial Control Configuration Software QTouch. A remote attacker could use this vulnerability to execute arbitrary code or cause a denial of service. CPU platform
VAR-201610-0734 No CVE Shanghai Xunrao X2Cloud Cloud Gateway Denial of Service Vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
X2Cloud Cloud Gateway is a cloud gateway product of Shanghai Xunrao Company. After the gateway collects data, it stores the data to the cloud platform, which sends data out through Modbus TCP interface or its own web interface. Shanghai Xunrao X2Cloud Cloud Gateway Denial of Service Vulnerability. Successful exploitation by a remote attacker can cause the Cloud Gateway to denial of service.
VAR-201610-0694 No CVE Beijing Jiekong Industrial Control Configuration Software FameView Code execution vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
FameView automatic configuration management software is a configuration monitoring software developed by Beijing Jiekong Company based on Windows operating system based on many years of engineering application and service experience. There is a code execution vulnerability in Beijing Jiekong Industrial Control Configuration Software FameView, which allows an attacker to execute malicious code
VAR-201610-0693 No CVE Beijing Jiekong Industrial Control Configuration Software FameView Arbitrary file read and write vulnerability CVSS V2: 4.6
CVSS V3: -
Severity: MEDIUM
FameView automatic configuration management software is a configuration monitoring software developed by Beijing Jiekong Company based on Windows operating system based on many years of engineering application and service experience. Beijing Jiekong's industrial control configuration software FameView has an arbitrary file reading and writing vulnerability that allows attackers to read and write arbitrary files
VAR-201610-0695 No CVE A component of Zijinqiao monitoring configuration software RealInfo has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Zijinqiao monitoring configuration software is a general industrial configuration software developed by Zijinqiao Company in long-term scientific research and engineering practice. A security vulnerability exists in a component of the software, allowing an attacker to exploit the vulnerability to construct a special data packet that can overflow the component and cause a denial of service
VAR-201610-0367 CVE-2015-6392 plural Cisco Nexus Run on device Cisco NX-OS Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Cisco NX-OS 4.1 through 7.3 and 11.0 through 11.2 on Nexus 2000, 5000, 5500, 5600, 6000, 7000, 7700, and 9000 devices allows remote attackers to cause a denial of service (device crash) via crafted IPv4 DHCP packets to the (1) DHCPv4 relay agent or (2) smart relay agent, aka Bug IDs CSCuq24603, CSCur93159, CSCus21693, and CSCut76171. plural Cisco Nexus Run on device Cisco NX-OS There is a service disruption ( Device crash ) There are vulnerabilities that are put into a state. Cisco NX-OS is a data center level operating system. Enables an unauthenticated remote attacker to cause the affected device to refuse service. Successful exploits may allow the attacker to crash the affected application resulting in denial-of-service condition. This issue is being tracked by Cisco bug IDs CSCuq24603, CSCur93159, CSCus21693 and CSCut76171. Cisco NX-OS on Nexus 2000, etc. The following products running Cisco NX-OS Software are affected: Cisco Nexus 2000, 5000, 5500, 5600, 6000, 7000, 7700, 9000
VAR-201610-0338 CVE-2016-1453 Cisco Nexus 7000 and 7700 Run on device Cisco NX-OS of Overlay Transport Virtualization GRE Buffer overflow vulnerability in function CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Buffer overflow in the Overlay Transport Virtualization (OTV) GRE feature in Cisco NX-OS 5.0 through 7.3 on Nexus 7000 and 7700 devices allows remote attackers to execute arbitrary code via long parameters in a packet header, aka Bug ID CSCuy95701. The Cisco Nexus 7000 Series Switches is a modular data center level product line. A security vulnerability exists in the OTVGRE implementation of the Cisco Nexus 7000/7700 Series Switches. A remote attacker could exploit the vulnerability to reload an affected system or execute arbitrary code remotely. This issue being tracked by Cisco Bug ID CSCuy95701
VAR-201610-0339 CVE-2016-1454 plural Cisco Nexus Run on device Cisco NX-OS Service disruption in (DoS) Vulnerabilities CVSS V2: 7.1
CVSS V3: 6.5
Severity: MEDIUM
Cisco NX-OS 4.0 through 7.3 and 11.0 through 11.2 on 1000v, 2000, 3000, 3500, 5000, 5500, 5600, 6000, 7000, 7700, and 9000 devices allows remote attackers to cause a denial of service (device reload) by leveraging a peer relationship to send a crafted BGP UPDATE message, aka Bug IDs CSCuq77105 and CSCux11417. plural Cisco Nexus Run on device Cisco NX-OS There is a service disruption ( Device reload ) There are vulnerabilities that are put into a state. Cisco NX-OSonNexus2000, etc. is a set of operating systems running on Nexus2000 and other devices from Cisco. A denial of service vulnerability exists in Cisco NX-OS versions 4.0 through 7.3 and 11.0 through 11.2. This issue is being tracked by Cisco bug IDs CSCuq77105 and CSCux11417. The following products are affected: Cisco Nexus 1000v, 2000, 3000, 3500, 5000, 5500, 5600, 6000, 7000, 7700, 9000
VAR-201610-0368 CVE-2015-6393 Cisco NX-OS Denial of Service Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Cisco NX-OS 4.1 through 7.3 and 11.0 through 11.2 on Nexus 2000, 3000, 3500, 5000, 5500, 5600, 6000, 7000, 7700, and 9000 devices allows remote attackers to cause a denial of service (device crash) via malformed IPv4 DHCP packets to the DHCPv4 relay agent, aka Bug IDs CSCuq39250, CSCus21733, CSCus21739, CSCut76171, and CSCux67182. plural Cisco Nexus Run on device Cisco NX-OS There is a service disruption ( Device crash ) There are vulnerabilities that are put into a state. Cisco NX-OSonNexus2000, etc. is a set of operating systems running on Nexus2000 and other devices from Cisco. A denial of service vulnerability exists in the actual process of the DHCPv4 relay agent in Cisco NX-OSS versions 4.1 to 7.3 and 11.0 to 11.2. collapse). Successful exploits may allow the attacker to crash the affected application resulting in denial-of-service condition. This issue is being tracked by Cisco bug IDs CSCuq39250,CSCus21733,CSCus21739,CSCut76171 and CSCux67182. The following products running Cisco NX-OS Software are affected: Cisco Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 600 Switches 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in Application Centric Infrastructure mode, Nexus 9000 Series Switches in NX-OS mode
VAR-201610-0663 CVE-2015-0721 Cisco NX-OS Security Bypass Vulnerability CVSS V2: 9.0
CVSS V3: 8.0
Severity: HIGH
Cisco NX-OS 4.0 through 7.3 on Multilayer Director and Nexus 1000V, 2000, 3000, 3500, 4000, 5000, 5500, 5600, 6000, 7000, 7700, and 9000 devices allows remote authenticated users to bypass intended AAA restrictions and obtain privileged CLI access via crafted parameters in an SSH connection negotiation, aka Bug IDs CSCum35502, CSCuw78669, CSCuw79754, and CSCux88492. plural Cisco Nexus Run on device Cisco NX-OS Is AAA The restrictions are circumvented, CLI There is a vulnerability that can gain access. Cisco NX-OS is a data center-oriented operating system from Cisco. A security bypass vulnerability exists in the SSH subsystem in Cisco NX-OS versions 4.0 through 7.3, which can be exploited by remote attackers to bypass AAA restrictions and execute commands on the device command line. Multiple Cisco Nexus Devices is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions and perform certain unauthorized actions. This may aid in further attacks. This issue is being tracked by Cisco Bug ID's CSCum35502, CSCuw78669, CSCuw79754, CSCux88492. The vulnerability is caused by the program not properly handling parameters during SSH connection negotiation. The following products running Cisco NX-OS System Software are affected: Cisco Multilayer Director Switches, Nexus 1000V Series Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 4000 Series Switches, Nexus Series 5 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in NX-OS mode
VAR-201704-0126 CVE-2016-5313 Symantec Web Gateway In any OS Command execution vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Symantec Web Gateway (SWG) before 5.2.5 allows remote authenticated users to execute arbitrary OS commands. Symantec Web Gateway is prone to a command-injection vulnerability. Successfully exploiting this issue may allow an attacker to inject arbitrary commands in the context of the affected appliance. Versions prior to Symantec Web Gateway 5.2.5 are vulnerable. Symantec Web Gateway (SWG) is a set of network content filtering software developed by Symantec Corporation of the United States. The software provides web content filtering, data loss prevention, and more. A remote attacker could exploit this vulnerability to execute operating system commands
VAR-201610-0305 CVE-2015-7363 Appliance model with hard disk Fortinet FortiManager and FortiAnalyzer Cross-site scripting vulnerability in Advanced Settings page CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in the advanced settings page in Fortinet FortiManager 5.x before 5.0.12 and 5.2.x before 5.2.3, in hardware models with a hard disk, and FortiAnalyzer 5.x before 5.0.13 and 5.2.x before 5.2.3 allows remote administrators to inject arbitrary web script or HTML via vectors related to report filters. FortiAnalyzer and FortiManager are prone to a HTML-injection vulnerability. Successful exploits will result in the execution of arbitrary attacker-supplied HTML and script code in the context of the affected application, potentially allowing the attacker to steal cookie-based authentication credentials or control how the page is rendered to the user. Other attacks are also possible. The following products are vulnerable: FortiManager 5.0.0 through 5.0.11 and 5.2.0 through 5.2.2 are vulnerable. FortiAnalyzer 5.0.0 through 5.0.12 and 5.2.0 through 5.2.2 are vulnerable. Both Fortinet FortiManager and FortiAnalyzer are products of Fortinet. Fortinet FortiManager is a centralized network security management solution. FortiAnalyzer is a centralized network security reporting solution. A cross-site scripting vulnerability exists in Fortinet FortiManager and Fortinet FortiAnalyzer. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML. The following versions are affected: Fortinet FortiManager versions 5.0.0 to 5.0.11, versions 5.2.0 to 5.2.2; Fortinet FortiAnalyzer versions 5.0.0 to 5.0.12, versions 5.2.0 to 5.2.2
VAR-201610-0273 CVE-2016-6422 Cisco 7600 and Catalyst 6500 Device Supervisor Engine 32 and 720 Runs on the module Cisco IOS Vulnerable to access restrictions CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
Cisco IOS 12.2(33)SXJ9 on Supervisor Engine 32 and 720 modules for 6500 and 7600 devices mishandles certain operators, flags, and keywords in TCAM share ACLs, which allows remote attackers to bypass intended access restrictions by sending packets that should have been recognized by a filter, aka Bug ID CSCuy64806. Vendors have confirmed this vulnerability Bug ID CSCuy64806 It is released as.Access restriction may be circumvented by sending a packet that should be recognized by the filter by a third party. Cisco IOS is an operating system developed by Cisco Systems for its network devices. A security vulnerability exists in the Cisco IOS 12.2(33)SXJ9 release that can be exploited by remote attackers to bypass established access restrictions. Cisco Catalyst 6500 Series Switches and 7600 Series Routers are prone to an information-disclosure vulnerability. An attacker can exploit this issue to obtain sensitive information. This may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCuy64806. The vulnerability is caused by the program not handling identifiers and keywords correctly