VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201602-0064 CVE-2016-1331 Cisco Emergency Responder Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Emergency Responder 11.5(0.99833.5) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuy10766. Cisco Emergency Responder Contains a cross-site scripting vulnerability. The software provides features such as real-time location tracking database and caller's location
VAR-201602-0386 CVE-2015-5010 IBM Security Access Manager for Web and Security Access Manager Vulnerabilities that gain access CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
IBM Security Access Manager for Web 7.0 before 7.0.0 IF21, 8.0 before 8.0.1.3 IF4, and 9.0 before 9.0.0.1 IF1 does not have a lockout mechanism for invalid login attempts, which makes it easier for remote attackers to obtain access via a brute-force attack. Supplementary information : CWE Vulnerability type by CWE-254: Security Features ( Security function ) Has been identified. http://cwe.mitre.org/data/definitions/254.htmlRound robin by a third party (brute-force) Access may be gained through an attack. An attacker can exploit this issue to gain access to sensitive information; this may lead to further attacks. It provides user access management and Web application protection function. There is a security hole in ISAM for Web, which is caused by the fact that the program does not set a locking mechanism for invalid login requests. The following versions are affected: ISAM for Web Version 7.0, Version 8.0, Version 9.0
VAR-201602-0228 CVE-2015-8531 IBM Security Access Manager for Web and Security Access Manager Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in IBM Security Access Manager for Web 8.0 before 8.0.1.3 IF4 and 9.0 before 9.0.0.1 IF1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. It provides user access management and Web application protection function. A cross-site scripting vulnerability exists in ISAM for Web versions 8.0 and 9.0
VAR-201602-0024 CVE-2016-0866 Tollgrade SmartGrid LightHouse Sensor Management System Software EMS Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in Tollgrade SmartGrid LightHouse Sensor Management System (SMS) Software EMS before 5.1, and 4.1.0 Build 16, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors
VAR-201602-0021 CVE-2016-0863 Tollgrade SmartGrid LightHouse Sensor Management System Software EMS Vulnerable to cross-site request forgery CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
Cross-site request forgery (CSRF) vulnerability in Tollgrade SmartGrid LightHouse Sensor Management System (SMS) Software EMS before 5.1, and 4.1.0 Build 16, allows remote attackers to hijack the authentication of arbitrary users. A remote attacker could exploit this vulnerability to perform unauthorized operations
VAR-201602-0022 CVE-2016-0864 Tollgrade SmartGrid LightHouse Sensor Management System Software EMS Vulnerability in obtaining critical reports and username information CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Tollgrade SmartGrid LightHouse Sensor Management System (SMS) Software EMS before 5.1, and 4.1.0 Build 16, allows remote attackers to obtain sensitive report and username information via unspecified vectors. Tollgrade SmartGrid LightHouse Sensor Management System (SMS) Software is a set of Web-based smart grid lighthouse sensor management system developed by Tollgrade Company in the United States. Security vulnerabilities exist in Tollgrade SmartGrid LightHouse SMS Software versions prior to 5.1 and 4.1.0 Build 16
VAR-201602-0023 CVE-2016-0865 Tollgrade SmartGrid LightHouse Sensor Management System Software EMS Vulnerable to arbitrary password changes CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Tollgrade SmartGrid LightHouse Sensor Management System (SMS) Software EMS before 5.1, and 4.1.0 Build 16, allows remote authenticated users to change arbitrary passwords via unspecified vectors. A remote attacker could exploit this vulnerability to change arbitrary passwords
VAR-201602-0061 CVE-2016-1323 Cisco Spark of REST Vulnerabilities that capture important information in the interface CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
The REST interface in Cisco Spark 2015-06 allows remote authenticated users to obtain sensitive information via a request for an unspecified file, aka Bug ID CSCuv84048. Cisco Spark is a set of collaborative service solutions of Cisco (Cisco). By providing a virtual space, the solution allows teams at any location to work together, call and video, discuss issues, store team files and documents, etc
VAR-201602-0053 CVE-2016-1315 Cisco Advanced Malware Protection Vulnerability that bypasses content restrictions in the proxy engine CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The proxy engine in Cisco Advanced Malware Protection (AMP), when used with Email Security Appliance (ESA) 9.5.0-201, 9.6.0-051, and 9.7.0-125, allows remote attackers to bypass intended content restrictions via a malformed e-mail message containing an encoded file, aka Bug ID CSCux45338. Vendors have confirmed this vulnerability Bug ID CSCux45338 It is released as. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlA third party may be able to bypass content restrictions via malformed email messages that contain encoded files. The solution supports access to the best global threat intelligence to strengthen network defenses and continuous analysis of file and data traffic to defend against front-line threats. Proxy engine is one of the proxy engine components. The following releases are affected: Cisco ESA Release 9.5.0-201, Release 9.6.0-051, Release 9.7.0-125
VAR-201602-0058 CVE-2016-1320 Cisco Prime Collaboration of CLI In root As any OS Command execution vulnerability CVSS V2: 6.8
CVSS V3: 6.7
Severity: MEDIUM
The CLI in Cisco Prime Collaboration 9.0 and 11.0 allows local users to execute arbitrary OS commands as root by leveraging administrator privileges, aka Bug ID CSCux69286. Cisco Prime Collaboration is a set of enterprise collaboration network management solutions from Cisco. This solution supports simplified unified communication and video collaboration network management through a unified management console, and rapid deployment of communication sites. A local attacker can exploit this vulnerability to execute arbitrary operating system commands with root privileges
VAR-201602-0060 CVE-2016-1322 Cisco Spark of REST Vulnerabilities that prevent access restrictions in the interface CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The REST interface in Cisco Spark 2015-07-04 allows remote attackers to bypass intended access restrictions and create arbitrary user accounts via unspecified web requests, aka Bug ID CSCuv72584. Cisco Spark is a set of collaborative service solutions of Cisco (Cisco). By providing a virtual space, the solution allows teams at any location to work together, call and video, discuss issues, store team files and documents, etc
VAR-201602-0062 CVE-2016-1324 Cisco Spark of REST Service disruption at the interface (DoS) Vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
The REST interface in Cisco Spark 2015-06 allows remote attackers to cause a denial of service (resource outage) by accessing an administrative page, aka Bug ID CSCuv84125. Vendors have confirmed this vulnerability Bug ID CSCuv84125 It is released as.Service operation disruption by accessing the management page by a third party ( Stop resources ) There is a possibility of being put into a state. Cisco Spark is a set of collaborative service solutions of Cisco (Cisco). By providing a virtual space, the solution allows teams at any location to work together, call and video, discuss issues, store team files and documents, etc
VAR-201602-0071 CVE-2016-1287 Cisco Adaptive Security Appliance (ASA) IKEv1 and IKEv2 contains a buffer overflow vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Buffer overflow in the IKEv1 and IKEv2 implementations in Cisco ASA Software before 8.4(7.30), 8.7 before 8.7(1.18), 9.0 before 9.0(4.38), 9.1 before 9.1(7), 9.2 before 9.2(4.5), 9.3 before 9.3(3.7), 9.4 before 9.4(2.4), and 9.5 before 9.5(2.2) on ASA 5500 devices, ASA 5500-X devices, ASA Services Module for Cisco Catalyst 6500 and Cisco 7600 devices, ASA 1000V devices, Adaptive Security Virtual Appliance (aka ASAv), Firepower 9300 ASA Security Module, and ISA 3000 devices allows remote attackers to execute arbitrary code or cause a denial of service (device reload) via crafted UDP packets, aka Bug IDs CSCux29978 and CSCux42019. Cisco Adaptive Security Appliance (ASA) of Internet Key Exchange version 1 and 2 (IKEv1, IKEv2) Contains a buffer overflow vulnerability. By exploiting the vulnerability, an attacker can execute code remotely. Buffer overflow (CWE-119) - CVE-2016-1287 Exodus Intelligence The advisory states that: : * "The algorithm for re-assembling IKE payloads fragmented with the Cisco fragmentation protocol contains a bounds-checking flaw that allows a heap buffer to be overflowed with attacker-controlled data. A sequence of payloads with carefully chosen parameters causes a buffer of insufficient size to be allocated in the heap which is then overflowed when fragment payloads are copied into the buffer. Attackers can use this vulnerability to execute arbitrary code on affected devices. (Cisco fragmentation protocol Divided by IKE The algorithm for recombining payloads is flawed in the bounds checking process, allowing the buffer on the heap to overflow with data that an attacker can control. Given a specially crafted payload sequence, a smaller buffer is reserved on the heap memory and overflow occurs when the payload is copied into the buffer. An attacker can exploit this vulnerability to execute arbitrary code on the affected device. )" CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer http://cwe.mitre.org/data/definitions/119.html IKEv1 and IKEv2 With VPN Systems that are configured to terminate are affected by this vulnerability. Cisco Security Advisory Whether the system is affected by the vulnerability (crypto map Whether or not ) Describes how to check. Cisco Security Advisory https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ikeCrafted by a remote attacker UDP If a packet is sent directly to the affected device, arbitrary code can be executed and the system can be hijacked. CiscoASA is an adaptive security appliance that provides a modular platform for security and VPN services, providing firewall, IPS, anti-X and VPN services. The platform provides features such as highly secure access to data and network resources
VAR-201602-0387 CVE-2015-5012 IBM Security Access Manager for Web Appliance SSH Vulnerability that breaks cryptographic protection mechanisms CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The SSH implementation on IBM Security Access Manager for Web appliances 7.0 before 7.0.0 FP19, 8.0 before 8.0.1.3 IF3, and 9.0 before 9.0.0.0 IF1 does not properly restrict the set of MAC algorithms, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. IBM Security Access Manager for Web is prone to an information-disclosure vulnerability. An attacker can exploit this issue to gain access to sensitive information; this may lead to further attacks. It provides user access management and Web application protection function. There is a security loophole in the SSH implementation of ISAM for Web. The loophole is caused by the program not correctly restricting the setting of the MAC algorithm. The following versions are affected: ISAM for Web Version 7.0, Version 8.0, Version 9.0
VAR-201602-0083 CVE-2016-2231 Huawei SmartAX MT882 Run on device Windows-based Host Interface Program Service disruption in services (DoS) Vulnerabilities CVSS V2: 9.0
CVSS V3: 9.8
Severity: CRITICAL
The Windows-based Host Interface Program (WHIP) service on Huawei SmartAX MT882 devices V200R002B022 Arg relies on the client to send a length field that is consistent with a buffer size, which allows remote attackers to cause a denial of service (device outage) or possibly have unspecified other impact via crafted traffic on TCP port 8701. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. HuaweiSmartAXMT882 is a router product. A denial of service vulnerability exists in the HuaweiSmartAXMT882 device V200R002B022Arg. The WHIP service relies on the client to send the length field. This can cause a remote attacker to cause a denial of service through the data stream constructed on TCP port 8701. Huawei SmartAX MT882 is prone to a denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition; denying service to legitimate users. There is a security vulnerability in the Windows-based Host Interface Program (WHIP) service of Huawei SmartAX MT882 V200R002B022 Arg version. The vulnerability comes from the fact that the program determines the buffer size according to the length field in the data packet sent by the client
VAR-201602-0072 CVE-2016-2314 Huawei SmartAX MT882 Used on device GlobespanVirata ftpd Service disruption in (DoS) Vulnerabilities CVSS V2: 6.3
CVSS V3: 4.9
Severity: MEDIUM
GlobespanVirata ftpd 1.0, as used on Huawei SmartAX MT882 devices V200R002B022 Arg, allows remote authenticated users to cause a denial of service (device outage) by using the FTP MKD command to create a directory with a long name, and then using certain other commands. Huawei SmartAX MT882 Used on device GlobespanVirata ftpd There is a service disruption ( Stop device ) There are vulnerabilities that are put into a state. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. HuaweiSmartAXMT882 is a router product. Huawei SmartAX MT882 is prone to a denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. GlobespanVirata ftpd is one of the FTP services. There is a security vulnerability in GlobespanVirata ftpd 1.0 used in Huawei SmartAX MT882 V200R002B022 Arg version
VAR-201602-0123 CVE-2016-2397 plural Dell SonicWALL Product cliserver Implementation of deserialization vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
The cliserver implementation in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote attackers to deserialize and execute arbitrary Java code via crafted XML data. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. An attacker can leverage this vulnerability to execute arbitrary code under the context of root. Multiple Dell SonicWALL Products are prone to a remote code-execution vulnerability. Successful exploitation can completely compromise the vulnerable device. The following products are vulnerable: Dell SonicWALL Global Management System Dell SonicWALL Analyzer Dell SonicWALL Universal Managemnet Appliance NOTE: This BID is being retired as it is a duplicate of BID 83200 (Multiple Dell SonicWALL Products Multiple Remote Code Execution Vulnerabilities). GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Analyzer is a set of network analyzer software for SonicWALL infrastructure. UMA EM5000 is a set of general management equipment software
VAR-201602-0122 CVE-2016-2396 plural Dell SonicWALL Product GMS ViewPoint Web An arbitrary command execution vulnerability in the application CVSS V2: 9.0
CVSS V3: 9.9
Severity: CRITICAL
The GMS ViewPoint (GMSVP) web application in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote authenticated users to execute arbitrary commands via vectors related to configuration input. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. Authentication is required to exploit this vulnerability.The specific flaw exists within the GMS ViewPoint (GMSVP) web application. The issue lies in the handling of configuration input due to a failure to safely sanitize user data before executing a command. An attacker could leverage this vulnerability to execute code with root privileges on the underlying operating system. Dell SonicWALL GMS (Global Management System), Analyzer and UMA EM5000 are all products of Dell (Dell). GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Analyzer is a set of network analyzer software for SonicWALL infrastructure. UMA EM5000 is a set of general management equipment software. The following products and versions are affected: Dell SonicWALL GMS, Analyzer, UMA EM5000 version 7.2, version 8.0, version 8.1 before Hotfix 168056
VAR-201602-0291 CVE-2015-7675 Ipswitch MOVEit DMZ and MOVEit Mobile Vulnerabilities that can bypass authentication CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
The "Send as attachment" feature in Ipswitch MOVEit DMZ before 8.2 and MOVEit Mobile before 1.2.2 allow remote authenticated users to bypass authorization and read uploaded files via a valid FileID in the (1) serverFileIds parameter to mobile/sendMsg or (2) arg01 parameter to human.aspx. Ipswitch MOVEit is an automated file transfer system from Ipswitch Corporation in the United States. The system supports control, management, and visibility into all business-critical file transfer activities through a single, secure system. DMZ and Mobile are the versions
VAR-201602-0292 CVE-2015-7677 Ipswitch MOVEit DMZ of MOVEitISAPI In service FileID Enumerated vulnerabilities CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
The MOVEitISAPI service in Ipswitch MOVEit DMZ before 8.2 provides different error messages depending on whether a FileID exists, which allows remote authenticated users to enumerate FileIDs via the X-siLock-FileID parameter in a download action to MOVEitISAPI/MOVEitISAPI.dll. Ipswitch MOVEit is an automated file transfer system from Ipswitch Corporation in the United States. The system supports control, management, and visibility into all business-critical file transfer activities through a single, secure system. DMZ is one version of this. There is a security vulnerability in the MOVEitISAPI service of Ipswitch MOVEit DMZ 8.1 and earlier versions. A remote attacker can exploit this vulnerability to enumerate FileIDs by using the 'X-siLock-FileID' parameter in the download operation of the MOVEitISAPI/MOVEitISAPI.dll file