VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201609-0598 No CVE Tencent T-920 Model PLC IP Fragment Denial of Service Vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
T920 is an integrated industrial high-performance programmable controller launched by Tengkong Technology. There is a denial of service vulnerability in the IP fragmentation syntax of the T-920 T-920 PLC. By testing its fragment reassembly ability, an attacker can send data frames filled with a large amount of malformed data to the target device, which can cause the system's buffer to overflow and cause the device to go down
VAR-201702-0682 CVE-2017-5164 BINOM3 Electric Power Quality Meter Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
An issue was discovered in BINOM3 Universal Multifunctional Electric Power Quality Meter. Input sent from a malicious client is not properly verified by the server. An attacker can execute arbitrary script code in another user's browser session (CROSS-SITE SCRIPTING). Cross-site scripting vulnerability 2. HTML injection vulnerability 3. Security bypass vulnerability 4. Information disclosure vulnerability. Attackers can use these vulnerabilities to execute arbitrary code in the context of the affected application, steal cookie-based authentication, obtain sensitive information, or bypass security restrictions to gain elevated permissions. Multiple information-disclosure vulnerabilities. 5
VAR-201702-0680 CVE-2017-5162 BINOM3 Electric Power Quality Meter Multiple Security Vulnerabilities CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered in BINOM3 Universal Multifunctional Electric Power Quality Meter. Lack of authentication for remote service gives access to application set up and configuration. Cross-site scripting vulnerability 2. HTML injection vulnerability 3. Security bypass vulnerability 4. Information disclosure vulnerability. Attackers can use these vulnerabilities to execute arbitrary code in the context of the affected application, steal cookie-based authentication, obtain sensitive information, or bypass security restrictions to gain elevated permissions. Multiple information-disclosure vulnerabilities. 5
VAR-201702-0683 CVE-2017-5165 BINOM3 Electric Power Quality Meter Multiple Security Vulnerabilities CVSS V2: 6.8
CVSS V3: 7.6
Severity: HIGH
An issue was discovered in BINOM3 Universal Multifunctional Electric Power Quality Meter. There is no CSRF Token generated per page and/or per (sensitive) function. Successful exploitation of this vulnerability can allow silent execution of unauthorized actions on the device such as configuration parameter changes, and saving modified configuration. Cross-site scripting vulnerability 2. HTML injection vulnerability 3. Security bypass vulnerability 4. Information disclosure vulnerability. Attackers can use these vulnerabilities to execute arbitrary code in the context of the affected application, steal cookie-based authentication, obtain sensitive information, or bypass security restrictions to gain elevated permissions. Multiple information-disclosure vulnerabilities. 5
VAR-201702-0684 CVE-2017-5166 BINOM3 Electric Power Quality Meter Multiple Security Vulnerabilities CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered in BINOM3 Universal Multifunctional Electric Power Quality Meter. An INFORMATION EXPOSURE flaw can be used to gain privileged access to the device. Cross-site scripting vulnerability 2. HTML injection vulnerability 3. Security bypass vulnerability 4. Information disclosure vulnerability. Attackers can use these vulnerabilities to execute arbitrary code in the context of the affected application, steal cookie-based authentication, obtain sensitive information, or bypass security restrictions to gain elevated permissions. Multiple information-disclosure vulnerabilities. 5
VAR-201702-0685 CVE-2017-5167 BINOM3 Electric Power Quality Meter Multiple Security Vulnerabilities CVSS V2: 7.5
CVSS V3: 8.6
Severity: HIGH
An issue was discovered in BINOM3 Universal Multifunctional Electric Power Quality Meter. Users do not have any option to change their own passwords. Cross-site scripting vulnerability 2. HTML injection vulnerability 3. Security bypass vulnerability 4. Information disclosure vulnerability. Attackers can use these vulnerabilities to execute arbitrary code in the context of the affected application, steal cookie-based authentication, obtain sensitive information, or bypass security restrictions to gain elevated permissions. Multiple information-disclosure vulnerabilities. 5. An attacker could exploit this vulnerability to gain access to the device
VAR-201704-0123 CVE-2016-5309 plural Symantec Product AntiVirus Decomposer Engine RAR Service disruption in file parser components (DoS) Vulnerabilities CVSS V2: 4.3
CVSS V3: 5.5
Severity: MEDIUM
The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted RAR file that is mishandled during decompression. plural Symantec Product AntiVirus Decomposer Engine RAR File parser component has a service disruption ( Read out of bounds ) There are vulnerabilities that are put into a state.Crafted by a remote attacker that is mishandled during decompression RAR Service disruption via file ( Read out of bounds ) There is a possibility of being put into a state. Multiple Symantec products are prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. AntiVirus Decomposer engine is one of the anti-virus engines. RAR file parser is one of the compressed file parsing components
VAR-201704-0124 CVE-2016-5310 plural Symantec Product AntiVirus Decomposer Engine RAR Service disruption in file parser components (DoS) Vulnerabilities CVSS V2: 4.3
CVSS V3: 5.5
Severity: MEDIUM
The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (memory corruption) via a crafted RAR file that is mishandled during decompression. plural Symantec Product AntiVirus Decomposer Engine RAR File parser component has a service disruption ( Memory corruption ) There are vulnerabilities that are put into a state.Crafted by a remote attacker that is mishandled during decompression RAR Service disruption via file ( Memory corruption ) There is a possibility of being put into a state. Multiple Symantec products are prone to a memory-corruption vulnerability. An attacker can exploit this issue to cause denial-of-service condition. Due to the nature of this issue, arbitrary code execution may be possible but this has not been confirmed. AntiVirus Decomposer engine is one of the anti-virus engines. RAR file parser is one of the compressed file parsing components
VAR-201704-0159 CVE-2016-8275 Huawei AnyOffice Input validation vulnerability CVSS V2: 3.5
CVSS V3: 6.5
Severity: MEDIUM
Huawei AnyOffice V200R006C00 could allow an authenticated, remote attacker to cause the software to deny services by uploading an XML bomb. Huawei AnyOffice Contains an input validation vulnerability.Service operation interruption (DoS) An attack may be carried out. Huawei AnyOffice is prone to a remote denial-of-service vulnerability. Successful exploits may allow the attacker to crash the affected application resulting in denial-of-service condition. Huawei AnyOffice is a mobile office application platform developed by China's Huawei (Huawei). Enterprise Mobile Management (EMM) is one of the modules that provides mobile terminal management functions. There are security vulnerabilities in Huawei AnyOffice EMM
VAR-201609-0068 CVE-2015-8960 TLS In the protocol TLS Vulnerability impersonating a server CVSS V2: 6.8
CVSS V3: 8.1
Severity: HIGH
The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue. TLS is prone to security-bypass vulnerability. Successfully exploiting this issue may allow attackers to perform unauthorized actions by conducting a man-in-the-middle attack. This may lead to other attacks. TLS (full name Transport Layer Security) protocol is a set of protocols used to provide confidentiality and data integrity between two communication applications. There are security holes in TLS protocol 1.2 and earlier versions
VAR-201609-0696 No CVE ASUS RT-N10E Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
ASUSRT-N10EWirelessRouter is a wireless router device developed by ASUS. A cross-site scripting vulnerability exists in ASUSRT-N10E. An attacker can exploit a vulnerability to initiate a cross-site scripting attack.
VAR-201609-0692 No CVE ASUS RT-N10E Code Execution Vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
ASUSRT-N10EWirelessRouter is a wireless router device developed by ASUS. ASUSRT-N10E has a code execution vulnerability. An attacker can exploit a vulnerability in a partial system command to possibly execute a system command. The code can also be executed by a cross-site request forgery attack.
VAR-201609-0702 No CVE ASUS RT-N10E URL Redirecting Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
ASUSRT-N10EWirelessRouter is a wireless router device developed by ASUS. A URLRT vulnerabilities exist in ASUSRT-N10E. Allows an attacker to exploit a vulnerability for a redirected attack.
VAR-201609-0689 No CVE There is a logic design vulnerability in the Howay series of wireless controller login systems CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Howay series wireless controller is a wireless controller independently developed by Hamming Technology Co., Ltd., which has the characteristics of large AP capacity, strong processing performance and rich functional features. There is a logic design vulnerability in the Howay series of wireless controller login systems that allows an attacker to exploit this vulnerability to spoof any cookie to log in and operate.
VAR-201609-0581 CVE-2016-6937 Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4266, CVE-2016-4267, CVE-2016-4268, CVE-2016-4269, and CVE-2016-4270. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4265 , CVE-2016-4266 , CVE-2016-4267 , CVE-2016-4268 , CVE-2016-4269 ,and CVE-2016-4270 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of FlateDecode streams. A crafted FlateDecode stream can trigger a read past the end of an allocated buffer. Failed attacks may cause a denial-of-service condition. The title and technical details have been changed to better reflect the vulnerability information. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF
VAR-201609-0334 CVE-2016-4526 ABB DataManagerPro DLL Native code execution vulnerability

Related entries in the VARIoT exploits database: VAR-E-201609-0259
CVSS V2: 6.9
CVSS V3: 7.5
Severity: HIGH
ABB DataManagerPro 1.x before 1.7.1 allows local users to gain privileges by replacing a DLL file in the package directory. ABB DataManagerPro Contains a privileged vulnerability. Supplementary information : CWE Vulnerability type by CWE-427: Uncontrolled Search Path Element ( Uncontrolled search path elements ) Has been identified. ABB DataManagerPro is a suite of data analysis software from ABB, Switzerland. The software automatically collects data via Ethernet and database management. ABB DataManagerPro is prone to a local arbitrary code-execution vulnerability because it fails to sanitize user-supplied input. A local attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. ABB DataManagerPro versions 1.0.0 through 1.7.0 are vulnerable
VAR-201609-0325 CVE-2016-6415 plural Cisco Product server IKEv1 Vulnerability in the implementation of critical information obtained from device memory

Related entries in the VARIoT exploits database: VAR-E-201204-0003, VAR-E-201204-0002, VAR-E-201204-0001
CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN. Cisco IOS and so on are all operating systems developed by Cisco. An information disclosure vulnerability exists in the implementation of server IKEv1 in several Cisco products. A remote attacker can use the vulnerability to send sensitive information from the device's memory by sending a SecurityAssociation negotiation request. This issue is being tracked by Cisco Bug IDs CSCvb29204 and CSCvb36055
VAR-201710-0058 CVE-2016-10699 D-Link DSL-2740E Device cross-site scripting vulnerability

Related entries in the VARIoT exploits database: VAR-E-201609-0074
CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
D-Link DSL-2740E 1.00_BG_20150720 devices are prone to persistent XSS attacks in the username and password fields: a remote unauthenticated user may craft logins and passwords with script tags in them. Because there is no sanitization in the input fields, an unaware logged-in administrator may be a victim when checking the router logs. D-Link DSL-2740E The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDSL-2740E is a wireless router product of D-Link. A security vulnerability exists in the D-LinkDSL-2740E1.00_BG_20150720 version that caused the program to fail to properly filter user-submitted input. A remote attacker could exploit this vulnerability to execute arbitrary script code in a browser. D-Link DSL-2740E ADSL Router is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks
VAR-201609-0392 CVE-2016-5814 plural Rockwell Automation RSLogix Product buffer overflow vulnerability CVSS V2: 9.3
CVSS V3: 8.6
Severity: HIGH
Buffer overflow in Rockwell Automation RSLogix Micro Starter Lite, RSLogix Micro Developer, RSLogix 500 Starter Edition, RSLogix 500 Standard Edition, and RSLogix 500 Professional Edition allows remote attackers to execute arbitrary code via a crafted RSS project file. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of a RSS (project) file. The issue lies in the failure to properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of the process. are all configuration software for automation products in Rockwell Automation. A buffer overflow vulnerability exists in several Rockwell Automation products. Failed exploit attempts will result in denial-of-service conditions
VAR-201609-0305 CVE-2016-4860 STARDOM Vulnerability in arbitrary command execution on controller CVSS V2: 7.5
CVSS V3: 7.3
Severity: HIGH
Yokogawa STARDOM FCN/FCJ controller R1.01 through R4.01 does not require authentication for Logic Designer connections, which allows remote attackers to reconfigure the device or cause a denial of service via a (1) stop application program, (2) change value, or (3) modify application command. Provided by Yokogawa Electric Corporation STARDOM A vulnerability exists in the controller that allows arbitrary commands to be executed. Provided by Yokogawa Electric Corporation STARDOM For small and medium-sized factories PLC Instrumentation system. STARDOM The controller is not authenticated when connecting from the logic designer (CWE-306) there is. for that reason, STARDOM An arbitrary command may be executed by a third party who can access the controller. CWE-306: Missing Authentication for Critical Function https://cwe.mitre.org/data/definitions/306.htmlSTARDOM By a third party with access to the controller IEC The application may be stopped, the value may be rewritten, or the application may be changed. YokogawaSTARDOMFCN/FCJcontroller is a controller for network-based control systems. Yokogawa STARDOM is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass authentication mechanism and execute arbitrary commands. The following versions are vulnerable: Yokogawa STARDOM FCJ versions from R1.01 to R4.01 are vulnerable. Yokogawa STARDOM FCN versions from R1.01 to R4.01 are vulnerable. The vulnerability is caused by the program not requiring authentication for Logic Designer connection