VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201512-0091 CVE-2015-7281 ReadyNet WRT300N-DD Wireless Router contains multiple vulnerabilities CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
Cross-site request forgery (CSRF) vulnerability on ReadyNet WRT300N-DD devices with firmware 1.0.26 allows remote attackers to hijack the authentication of arbitrary users. ReadyNet WRT300N-DD Wireless Router, firmware version 1.0.26, uses default credentials, is vulnerable to cross-site request forgery, and uses insufficiently random values for DNS queries. ReadyNetWRT300N-DDdeviceswithfirmware is a wireless router product from ReadyNet, New Zealand. An attacker can exploit these issues to bypass certain security restrictions, allowing attackers to perform certain unauthorized actions or by tricking a victim into following a specially crafted HTTP request designed to perform some action on the attacker's behalf using a victim's currently active session. A remote attacker could exploit this vulnerability to perform unauthorized operations
VAR-201512-0089 CVE-2015-7279 Amped Wireless R10000 router contains multiple vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Amped Wireless R10000 devices with firmware 2.5.2.11 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value. Supplementary information : CWE Vulnerability type by CWE-331: Insufficient Entropy ( Lack of entropy ) Has been identified. AmpedWirelessR10000deviceswithfirmware is the R10000 series router from AmpedWireless. An attacker can exploit these issues to bypass certain security restrictions, allowing attackers to perform certain unauthorized actions or by tricking a victim into following a specially crafted HTTP request designed to perform some action on the attacker's behalf using a victim's currently active session. A remote attacker can exploit this vulnerability to forge response information
VAR-201512-0087 CVE-2015-7277 Amped Wireless R10000 router contains multiple vulnerabilities CVSS V2: 9.3
CVSS V3: 9.8
Severity: CRITICAL
The web administration interface on Amped Wireless R10000 devices with firmware 2.5.2.11 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. Amped Wireless R10000 router, firmware version 2.5.2.11, uses default credentials, is vulnerable to cross-site request forgery, and uses insufficiently random values for DNS queries. AmpedWirelessR10000deviceswithfirmware is the R10000 series router from AmpedWireless. A credential management vulnerability exists in AmpedWirelessR10000deviceswithfirmware2.5.2.11. An attacker can exploit these issues to bypass certain security restrictions, allowing attackers to perform certain unauthorized actions or by tricking a victim into following a specially crafted HTTP request designed to perform some action on the attacker's behalf using a victim's currently active session. The vulnerability is due to the use of 'admin' as the password for the admin account
VAR-201601-0429 CVE-2015-8337 Huawei Mate7 and P8 HIFI Driver Denial of Service Vulnerability CVSS V2: 7.1
CVSS V3: 5.5
Severity: MEDIUM
The HIFI driver in Huawei P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, GRA-UL10 before GRA-UL10C00B220 and Mate7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 allows remote attackers to cause a denial of service (invalid memory access and reboot) via unspecified vectors related to "input null pointer as parameter.". Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. HuaweiMate7 and P8 are both Huawei's smartphone products. HIFIdriver is one of the HIFI sound drivers. Huawei Smart Phones are prone to multiple local denial-of-service vulnerabilities. An attacker can exploit these issues to cause an affected system to reload, denying service to legitimate users. The Huawei Mate 7 and P8 are smartphones from the Chinese company Huawei. The following products and versions are affected: Huawei Mate7 using software versions prior to MT7-UL00C17B354, versions prior to MT7-TL10C00B354, versions prior to MT7-TL00C01B354, and versions prior to MT7-CL00C92B354, using versions prior to GRA-TL00C01B220SP01, versions prior to GRA-CL00C92B220, and GRA - P8 of software prior to CL10C92B220, prior to GRA-UL00C00B220, and prior to GRA-UL10C00B220
VAR-201512-0422 CVE-2015-6389 Cisco Prime Collaboration Assurance Vulnerabilities that gain access CVSS V2: 9.0
CVSS V3: -
Severity: HIGH
Cisco Prime Collaboration Assurance before 11.0 has a hardcoded cmuser account, which allows remote attackers to obtain access by establishing an SSH session and leveraging knowledge of this account's password, aka Bug ID CSCus62707. Remote attackers with knowledge of the default credentials may exploit this vulnerability to gain unauthorized access and perform unauthorized actions. This may aid in further attacks. This issue being tracked by Cisco Bug ID CSCus62707. This solution supports simplified unified communication and video collaboration network management through a unified management console, and rapid deployment of communication sites
VAR-201512-0388 CVE-2015-6413 Cisco TelePresence Video Communication Server Expressway Unauthorized Access Vulnerability CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
Cisco TelePresence Video Communication Server (VCS) Expressway X8.6 allows remote authenticated users to bypass intended read-only restrictions and upload Tandberg Linux Package (TLP) files by visiting an administrative page, aka Bug ID CSCuw55651. Cisco TelePresence Video Communication Server is a telepresence video communication server from Cisco Systems, USA. Attackers can exploit this issue to gain unauthorized access to the affected application. This may help in further attacks. This issue is being tracked by Cisco bug ID CSCuw55651
VAR-201512-0384 CVE-2015-6408 Cisco Unity Connection Vulnerable to cross-site request forgery CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Cross-site request forgery (CSRF) vulnerability in Cisco Unity Connection 11.5(0.98) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCux24578. Cisco Unity Connection is a voice messaging platform that runs on the same Linux-based Cisco Unified Communications Operating System. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible. This issue is being tracked by Cisco Bug ID CSCux24578. The platform can use voice commands to make calls or listen to messages "hands-free"
VAR-201512-0410 CVE-2015-6403 plural Cisco Small Business SPA Phone TFTP Implementation of a Trojan image loaded vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
The TFTP implementation on Cisco Small Business SPA30x, SPA50x, SPA51x phones 7.5.7 improperly validates firmware-image file integrity, which allows local users to load a Trojan horse image by leveraging shell access, aka Bug ID CSCut67400. Multiple Cisco IP Phones are prone to a local arbitrary file-upload vulnerability. A local attacker may leverage this issue to upload arbitrary files to the affected device. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCut67400. Cisco Small Business SPA30x, SPA50x and SPA51x are the S series IP telephone products of Cisco (Cisco). The vulnerability is caused by the fact that the program does not correctly verify the integrity of the firmware-image file. The following products are affected: Cisco SPA30X Series IP Phones, SPA50X Series IP Phones, SPA51X Series IP Phones
VAR-201512-0387 CVE-2015-6411 Cisco FirePOWER Management Center Software Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco FirePOWER Management Center 5.4.1.3, 6.0.0, and 6.0.1 provides verbose responses to requests for help files, which allows remote attackers to obtain potentially sensitive version information by reading an unspecified field, aka Bug ID CSCux37061. Vendors have confirmed this vulnerability Bug ID CSCux37061 It is released as.By reading unspecified fields by a third party, important version information may be obtained. The Cisco FirePOWER Management Center is the next-generation firewall management center software from Cisco. An attacker could exploit the vulnerability to gain access to sensitive information. This issue being tracked by Cisco Bug ID CSCux37061
VAR-201512-0386 CVE-2015-6410 Cisco Unified Communications Manager of Mobile and Remote Access Vulnerability that can bypass the restriction of telephone reception and telephone setting in service implementation CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
The Mobile and Remote Access (MRA) services implementation in Cisco Unified Communications Manager mishandles edge-device identity validation, which allows remote attackers to bypass intended call-reception and call-setup restrictions by spoofing a user, aka Bug ID CSCuu97283. Vendors have confirmed this vulnerability Bug ID CSCuu97283 It is released as.By impersonating a user by a third party, it may be possible to circumvent restrictions on receiving calls and settings. Cisco Unified Communications Manager is prone to a security-bypass vulnerability. Successful exploits may allow an attacker to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCuu97283. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution. The vulnerability stems from the fact that the program does not properly handle edge-device authentication. Remote attackers can exploit this vulnerability by forging user identities to bypass established call-reception and call-setup restrictions
VAR-201512-0512 CVE-2015-7789 WL-330NUL vulnerable to denial-of-service (DoS) CVSS V2: 3.3
CVSS V3: 4.3
Severity: MEDIUM
ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to cause a denial of service via unspecified vectors. WL-330NUL provided by ASUS Japan Inc. is a portable wireless LAN router. WL-330NUL contains a denial-of-service (DoS) vulnerability. TAIZO TSUKAMOTO of GLOBAL SECURITY EXPERTS Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker who can access the product may be able to cause a denial-of-service (DoS). There is a denial of service vulnerability in WL-330NUL. WL-330NUL Firmware versions prior to 3.0.0.42 are vulnerable
VAR-201512-0513 CVE-2015-7790 ASUS Japan WL-330NUL Device Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability on ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. WL-330NUL provided by ASUS Japan Inc. is a portable wireless LAN router. WL-330NUL contains a stored cross-site scripting vulnerability. TAIZO TSUKAMOTO of GLOBAL SECURITY EXPERTS Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the user's web browser. ASUS WL-330NUL router is prone to an unspecified cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks
VAR-201512-0510 CVE-2015-7787 WL-330NUL information management vulnerability CVSS V2: 3.3
CVSS V3: 4.3
Severity: MEDIUM
ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to discover the WPA2-PSK passphrase via unspecified vectors. WL-330NUL provided by ASUS Japan Inc. is a portable wireless LAN router. WL-330NUL contains an issue in information management. TAIZO TSUKAMOTO of GLOBAL SECURITY EXPERTS Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker that can access the product may obtain the WPA2-PSK passphrase. WL-330NUL has an information disclosure vulnerability. Allows an attacker to discover WPA2-PSK passwords using unidentified vectors. Asus WL-330NUL is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks. WL-330NUL Firmware versions prior to 3.0.0.42 are vulnerable
VAR-201512-0511 CVE-2015-7788 WL-330NUL vulnerable to remote command execution CVSS V2: 5.8
CVSS V3: 7.3
Severity: HIGH
ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to execute arbitrary commands via unspecified vectors. WL-330NUL provided by ASUS Japan Inc. is a portable wireless LAN router. WL-330NUL contains a remote command execution vulnerability. TAIZO TSUKAMOTO of GLOBAL SECURITY EXPERTS Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker that can access the product may execute an arbitrary command with administrative privileges. Asus WL-330NUL is prone to an unspecified remote command-execution vulnerability because it fails to sufficiently validate user-input supplied
VAR-201512-0435 CVE-2015-8457 Adobe Flash Player and Adobe AIR Vulnerable to stack-based buffer overflow CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Stack-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8407. This vulnerability CVE-2015-8407 Is a different vulnerability.An attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of HTTP Live Streaming. The issue lies in the failure to validate the size of a user-supplied buffer prior to copying it to a stack buffer. Failed exploit attempts will likely result in denial-of-service conditions. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.245 and earlier versions based on Windows and Macintosh platforms and Adobe Flash Player Extended Support Release 18.0.0.261 and earlier versions, Adobe Flash based on Windows, Macintosh, Linux and ChromeOS platforms Player for Google Chrome 19.0.0.245 and earlier versions, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.245 and earlier versions based on Windows 10, Adobe Flash Player for Internet Explorer 10 and 11 19.0 based on Windows 8.0 and 8.1 platforms .0.245 and earlier versions, Adobe Flash Player for Linux 11.2.202.548 and earlier versions based on Linux platforms, AIR Desktop Runtime 19.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR SDK based on Windows, Macintosh, Android and iOS platforms 19.0.0.241 and earlier versions and AIR SDK & Compiler 19.0.0
VAR-201512-0434 CVE-2015-8456 Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-8439. This vulnerability CVE-2015-8439 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-843:Access of Resource Using Incompatible Type ( Mixing of molds ) Has been identified. http://cwe.mitre.org/data/definitions/843.htmlUnspecified by attacker " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.245 and earlier versions based on Windows and Macintosh platforms and Adobe Flash Player Extended Support Release 18.0.0.261 and earlier versions, Adobe Flash based on Windows, Macintosh, Linux and ChromeOS platforms Player for Google Chrome 19.0.0.245 and earlier versions, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.245 and earlier versions based on Windows 10, Adobe Flash Player for Internet Explorer 10 and 11 19.0 based on Windows 8.0 and 8.1 platforms .0.245 and earlier versions, Adobe Flash Player for Linux 11.2.202.548 and earlier versions based on Linux platforms, AIR Desktop Runtime 19.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR SDK based on Windows, Macintosh, Android and iOS platforms 19.0.0.241 and earlier versions and AIR SDK & Compiler 19.0.0
VAR-201512-0114 CVE-2015-7080 Apple iOS of Siri Vulnerability bypasses client-side protection mechanism CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Siri in Apple iOS before 9.2 allows physically proximate attackers to bypass an intended client-side protection mechanism and obtain sensitive content-notification information by listening to a device in the lock-screen state. Apple iOS is an operating system developed by Apple for mobile phones and the like. Apple iOS is prone to multiple security vulnerabilities. Attackers can exploit these issues to bypass security restrictions, execute arbitrary code, spoof the source URI of a site presented to an unsuspecting user. Failed exploit attempts may cause a denial-of-service condition. Versions prior to iOS 9.2 are vulnerable. Siri is one of the voice control components
VAR-201512-0541 CVE-2014-3260 Pacom 1000 CCU and RTU GMS Vulnerability to forge data stream between controller and base in device CVSS V2: 6.8
CVSS V3: 7.5
Severity: HIGH
Pacom 1000 CCU and RTU GMS devices allow remote attackers to spoof the controller-to-base data stream by leveraging improper use of cryptography. The Pacom 1000 CCU and RTU are products of Pacom, Sweden. The former is a network security panel for controlling, monitoring and maintaining remote sites, and the latter is a security panel that controls the access control alarm system. There are security vulnerabilities in the Pacom 1000 CCU and RTU encryption algorithms. The vulnerability can be exploited by an attacker to control communication between the program and the base station. Pacom RTU, EMCS and 1000 CCU are prone to multiple cryptography weaknesses. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 XPD - XPD Advisory https://xpd.se Crypto implementation flaws in Pacom GMS System Advisory ID: XPD-2015-001 CVE reference: CVE-2014-3260 Affected platforms: Pacom 1000 CCU ("Base Station") and Controllers (RTU) Version: All versions are affected Date: 2013-Oktober-10 Security risk: High Vulnerability: Crypto implementation flaws in Pacom GMS System Researcher: Joachim Strombergson, Fredrik Soderblom, Peter Norin Vendor Status: Notified / Patch available Vulnerability Disclosure Policy: https://xpd.se/advisories/xpd-disclosure-policy-01.txt Permanent URL: https://xpd.se/advisories/XPD-2015-001.txt ===================================================================== Summary: The Pacom 1000 CCU and controllers (RTU) is used in security alarm installations all over the world. The flaws we have found can bypass the security of any unpatched installation. It is located at the site itself and performs all alarm and door control functions." - http://www.pacom.com/field-controllers.php "Pacom security solutions are installed in over twenty countries on seven continents." - http://www.pacom.com/our-customers.php Detailed description: The Pacom 1000 implementation have several serious implementation flaws. These vulnerabilities could in a worst case scenario lead to a full compromise of the protocol between the controller and the base station, rendering an alarm system useless. Potentially a large number of sites could be affected by the described flaws. PRNG: The PRNG used is of a type known as a Linear Congruential Generator. This type of generator are known to provide random numbers with less than perfect uniform distribution. The PRNG is a 16-bit generator. This means that the generator can only generate 2**16 numbers in a sequence before it must be reseeded. There is no information about how the generator is seeded from start nor how it is reseeded. A simulation in Dieharder shows that the used algorithm fails every test except for one, where it receives the result 'Weak'. The Linear Congruential Generator can be broken by observing values generated by consecutive iterations of the PRNG. The system creates 32-bit random numbers by extracting 8-bits from four consecutive 16-bit words numbers generated by the PRNG. This means that by observing a single 32-bit word, an attacker has in fact half the state information (8 out of 16 bits) from four iterations of the generator. MAC: A Message Authentication Code (MAC) is generated and added to each message sent between CCU and Controller. The MAC generator generator used is not based on any well-known secure MAC functionality such as HMAC or OMAC. Furthermore the generated MAC is only 32 bit. Master Code: There is a functionality for substitution detection. According to Pacom the functionality is based on a proprietary Pacom encryption method. Key to the functionality is a a 24-bit randomly generated value called Master Code. The Master Code is also used to generate the 128-bit AES key used with the substitution detection algorithm. Hence the effective strength of the key is not 128 bits, nor 104 bits (128 - 24) but 24 bits. A very short key with low security. Unfortunately it appears that the aforementioned (16 bit only), less than optimal, PRNG is used to generate the Master Code, thus reducing it's effective strength to 16 bit. The Master Code is distributed from CCU to CPU-cards and other CCUs as well as GMS units (for logging purposes) in clear text. This means that the code potentially is sent unprotected over private networks, corporate networks, public networks etc. Substitution detection: According to Pacom documentation the "substitution detection involves appending a 128-bit check code to the controller heartbeat response messages. The check code is calculated from a combination of a hard-coded constant value, the controllers master code, and the message data. In essence it is another type of MAC, but one that employs the master code." The implementation of the substitution detection uses a "check code" which is said to be 128-bits long and is appended to response messages. However due to a design flaw, the code is only 64 bit. In total the heartbeat response message is 5 bytes (40 bits) long: Byte 1: The message type (e.g. heartbeat response) Byte 2: A value based on random numbers sent in the heartbeat command from the CCU Byte 3: The controller summary status Byte 4: The heartbeat sequence number (zero or one) Byte 5: Always zero Of the five bytes in the heartbeat response message, two bytes (4 and 5) are either one or zero, or always zero. Byte 3 is a simple status. So, of 40 bits, 32 bits are most likely predictable and the remaining 8 bits is probably choosen based on the weak PRNG. This means that a big part of the response message can be guessed. The so called "128-bit check code" is then calculated over these 5 bytes using the aforementioned flawed Master Code and a 2 byte address of the controller, forming a 40 bit key, which is used with a hard coded constant to form an AES-128 key. The resulting "128-bit check code" from the AES encryption is XOR:ed with its own cleartext. This means that there is a direct path from cleartext to ciphertext bypassing the AES encryption. This leaks information about the cleartext as well as opening up for chosen plaintext attacks. Hard coded constants: The security functionality uses several hard coded, secret constants for random number generation, MAC calculation, Substitution detection algorithm etc. Unfortunately, the way these constants are used, information about them are leaked through the very messages, which opens up for recovery of the constants. If the constants are recovered and thus system security is lost, the units must be reprogrammed in the field or even replaced. ===================================================================== Conclusion: We do not recommend relying on the security features in the system and the system should be viewed as an unprotected system. If the system is to be used, separate communication security mechanism should be added. However, the usage of hard coded constants in the units and the associated need for field service or replacement if a breach occurs, makes us recommend that the system needs severe redesign before it is ready for production use. We questions if the system has been designed with any knowledge of what has been known good security practices since at least 30 years, nor good engineering practice. ===================================================================== Versions affected: All versions of Pacom 1000 (CCU & RTU) - According to Pacom, this firmware will not be fixed. Customers are advised to switch to the EMCS platform instead. All versions of EMCS (Pacom .is) prior to 1.3 The vendor reports that the following versions are patched: EMCS (Pacom .is) version 1.3 and above ===================================================================== Credits This vulnerability was discovered and researched by Joachim Strombergson from Assured AB, Fredrik Soderblom and Peter Norin from XPD AB. ===================================================================== References https://en.wikipedia.org/wiki/Linear_congruential_generator https://en.wikipedia.org/wiki/Diehard_tests ===================================================================== History 2013-10-10 Initial Discovery 2013-10-22 Initial attempt to contact the vendor 2013-11-12 Reply from Niscayah, case is assigned to internal resource 2014-05-07 CVE-2014-3260 is assigned 2014-06-05 Draft of the advisory sent to the vendor 2014-09-01 Pacom notifies us that fixed firmware (EMCS only) is ready 2015-12-08 Public disclosure ===================================================================== About Assured Assured AB is a privately held company with headquarters in Gothenburg, Sweden. Established in 2015, Assured is an independant security consultancy firm that provides expert knowledge, advisory and design of IT- security solutions. http://assured.se About XPD XPD AB is a privately held company with Headquarters in Stockholm, Sweden. Established in 2002, XPD AB is an independent security consulting and research firm, with a focus on security and perimeter security solutions. https://xpd.se ===================================================================== Disclaimer and Copyright Copyright (c)2015 XPD AB and Assured AB. All rights reserved. This advisory may be distributed as long as its distribution is free-of-charge and proper credit is given. The information provided in this advisory is provided "as is" without warranty of any kind. XPD AB and Assured AB disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall XPD AB or Assured AB, or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if XPD AB or Assured AB, or its suppliers have been advised of the possibility of such damages. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJWYCTaAAoJEH47YPoA7U9kecIQAJP3eHCA6zdz3sq1bAPg4JOc SBmq/auoraVpcucBzjVkGy8qtCF12mu0Gf2Kn6zwCtUcBmfjAo97HZYFx582ofOy K0ZGkA06tfGWJthDZ1eyeotQq9yBRLl1un1hGmrM/CvyRMp7KDd2jUptBps6Ddrk dl5a8+tMcQkedSV+dNDLwVpLWn8/hsDL8YjbZCeVomNtgceTb07hMv6zqrf3TgYZ yyq7xlLNzEyQSXyF0qF+yKsQ0HQyAnzQyoyzzYjeSbBBhvjeb/6x0S8t0QuP2Hqy cM+zNn/zzPoaubHFVUMi0tluhr/mqagrdmugmWG5cEfStmZYKJLkM/1EkFZDmlUF fuWQ/YrIgYU8twBwqzO+9iUdMM6gqRNaKIO5nN+1ivlYwxoVJ5N+gYCUbEZCGQac JDWGuYtHUpEzL/E2WrLq6iTpxutn1iAuyDM67/vsJaucLngLHJdW/iCIx4OVNdn4 caXMo4UZbJUzzu1OOCtCuYpUZHIbLuuVZkmb3ihj5UL/Z9OXyGKv4XpFed8xqydx FnB+dsnaG1HKyKIfNUVl7uiODEe2qiPUdmdY7J/0UWksYmoAPq77rmqhfEIH9jaU 0nq3frmUk70XdEjPG9oIr1Mw02ugIS8cYPM7zn57TskNnBnrlnO2PkBzSBOGJy08 NzycvpVV7wdtvgKeZHum =b7KM -----END PGP SIGNATURE-----
VAR-201603-0038 CVE-2016-2287 XZERES 442SR Wind Turbines Run on 442SR OS Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in XZERES 442SR OS on 442SR wind turbines allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks
VAR-201512-0010 CVE-2015-7906 plural LOYTEC Vulnerability to read password hash backup file on device CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
LOYTEC LIP-3ECTB 6.0.1, LINX-100, LVIS-3E100, and LIP-ME201 devices allow remote attackers to read a password-hash backup file via unspecified vectors. plural LOYTEC The device contains a vulnerability that allows it to read password hash backup files.A third party may be able to read password hash backup files. LOYTEC LIP devices are IP network router devices from LOYTEC, Germany. LOYTEC LIP-3ECTB 6.0.1, LINX-100, LVIS-3E100, LIP-ME201 devices have information disclosure vulnerabilities. LOYTEC Router is prone to an arbitrary file-download vulnerability. An attacker can exploit this issue to download backup files. Information obtained may aid in further attacks. The following products and versions are affected: LOYTEC LIP-3ECTB version 6.0.1, LINX-100, LVIS-3E100, LIP-ME201