VARIoT IoT vulnerabilities database
| VAR-201404-0576 | CVE-2014-2139 | Cisco ONS 15454 Service operation interruption in controller card software (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco ONS 15454 controller cards with software 9.6 and earlier allow remote attackers to cause a denial of service (flash write outage) via a TCP FIN attack that triggers file-descriptor exhaustion, aka Bug ID CSCug97315. Cisco ONS 15454 Controller card software does not interfere with service operation ( Stop flash programming ) There are vulnerabilities that are put into a state. Cisco ONS 15454 System Software is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to prevent system write access to the flash memory.
This issue is being tracked by Cisco bug ID CSCug97315. Cisco ONS 15454 is a set of optical network multi-service transmission platform of American Cisco (Cisco). The platform leverages optical transport technologies such as Resilient Packet Ring (RPR), SDH, and DWDM/CWDM to integrate Ethernet, IP, storage, and TDM services to deliver next-generation voice, data services, and more. Controller Cards is one of the control cards
| VAR-201404-0577 | CVE-2014-2140 | Cisco ONS 15454 Service operation interruption in controller card software (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco ONS 15454 controller cards with software 9.6 and earlier allow remote attackers to cause a denial of service (card reset) via a TCP FIN attack that triggers file-descriptor exhaustion and a failure to open a CAL pipe, aka Bug ID CSCug97348. Cisco ONS 15454 Controller card software does not interfere with service operation ( Reset card ) There are vulnerabilities that are put into a state. Cisco ONS 15454 System Software is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause the control card to reset, denying service to legitimate users.
This issue is being tracked by Cisco bug ID CSCug97348. Cisco ONS 15454 is a set of optical network multi-service transmission platform of American Cisco (Cisco). The platform leverages optical transport technologies such as Resilient Packet Ring (RPR), SDH, and DWDM/CWDM to integrate Ethernet, IP, storage, and TDM services to deliver next-generation voice, data services, and more. Controller Cards is one of the control cards
| VAR-201404-0579 | CVE-2014-2142 | Cisco ONS 15454 Service operation interruption in controller card software (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco ONS 15454 controller cards with software 10.0 and earlier allow remote attackers to cause a denial of service (card reload) via a crafted HTTP URI, aka Bug ID CSCun06870. Cisco ONS 15454 System Software is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause the control card to reset, denying service to legitimate users.
This issue is being tracked by Cisco bug ID CSCun06870. Cisco ONS 15454 is a set of optical network multi-service transmission platform of American Cisco (Cisco). The platform leverages optical transport technologies such as Resilient Packet Ring (RPR), SDH, and DWDM/CWDM to integrate Ethernet, IP, storage, and TDM services to deliver next-generation voice, data services, and more. Controller Cards is one of the control cards
| VAR-201404-0578 | CVE-2014-2141 | Cisco ONS 15454 Service disruption in controller card session termination function (DoS) Vulnerabilities |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The session-termination functionality on Cisco ONS 15454 controller cards with software 9.6 and earlier does not initialize an unspecified pointer, which allows remote authenticated users to cause a denial of service (card reset) via crafted session-close actions, aka Bug ID CSCug97416. Cisco ONS 15454 The controller card's session termination function does not initialize unspecified pointers. ( Card reset ) There are vulnerabilities that are put into a state. Cisco ONS 15454 System Software is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause the control card to reset, denying service to legitimate users.
This issue is being tracked by Cisco bug ID CSCug97416. Cisco ONS 15454 is a set of optical network multi-service transmission platform of American Cisco (Cisco). The platform leverages optical transport technologies such as Resilient Packet Ring (RPR), SDH, and DWDM/CWDM to integrate Ethernet, IP, storage, and TDM services to deliver next-generation voice, data services, and more. Controller Cards is one of the control cards. The vulnerability is caused by the fact that the program does not have an initialization pointer
| VAR-201404-0740 | No CVE | Comtrend CT-5361T ADSL Router 'password.cgi' Password Disclosure Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Comtrend CT-5361T ADSL Router is an ADSL router product of Comtrend.
A password leak vulnerability exists in the Comtrend CT-5361T ADSL Router, which is due to a design error. An attacker could use this vulnerability to obtain sensitive information. The Comtrend CT-5361T using A111-312SSG-T02_R01 firmware has vulnerabilities, and other versions may also be affected. Successfully exploiting this issue may lead to other attacks
| VAR-201404-0716 | No CVE | Halon Security Router Multiple Security Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Halon Security Router is a router product from Halon Security, USA.
There are multiple security vulnerabilities in Halon Security Router 3.2-winter-r1 and earlier versions: 1. Cross-site scripting vulnerability 2. Cross-site request forgery vulnerability 3. Open redirection vulnerability. When a user browses an affected website, their browser executes arbitrary script code provided by the attacker. This could lead to attackers stealing cookie-based authentication, performing unauthorized operations, or redirecting users to malicious websites. Other attacks are also possible
| VAR-201404-0592 | CVE-2014-0160 |
HP Security Bulletin HPSBMU02998 3
Related entries in the VARIoT exploits database: VAR-E-201404-0110, VAR-E-201404-0107, VAR-E-201404-0108, VAR-E-201404-0109 |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
NOTE: No patch will be available for HP 3PAR OS 3.1.2 GA. HP recommends that
customers with arrays running HP 3PAR OS 3.1.2 GA should upgrade to the
latest available MU or HP 3PAR OS 3.1.3 P01. HP 3PAR OS Version
Available patch
HP 3PAR OS 3.1.3
P01
HP 3PAR OS 3.1.2 MU1, MU2, and MU3
P39
HP can perform the upgrade. Contact the HP global deployment center at
3par-sps@hp.com. Please include the HP 3PAR StoreServ Storage system serial
number in the subject line. The email service is available 24 hours a day, 7
days a week.
A support case can be opened to request the upgrade, but the email service is
recommended.
No controller node reboot is required for the patch, when staying with the
same OS version.
HISTORY
Version:1 (rev.1) - 22 April 2014 Initial release
Version:2 (rev.2) - 23 April 2014 Added recommendation for use of 3PAR OS
Management Tools. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Multiple Vulnerabilities in Cisco TelePresence System MXP Series
Advisory ID: cisco-sa-20140430-mxp
Revision 1.0
For Public Release 2014 April 30 16:00 UTC (GMT)
Summary
=======
Cisco TelePresence System MXP Series Software contains the following vulnerabilities:
Three SIP denial of service vulnerabilities
Three H.225 denial of service vulnerabilities
Successful exploitation of these vulnerabilities may allow an attacker to cause system instability and the affected system to reload.
There are no workarounds that mitigate these vulnerabilities. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201404-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: OpenSSL: Information Disclosure
Date: April 08, 2014
Bugs: #505278, #507074
ID: 201404-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple Information Disclosure vulnerabilities in OpenSSL allow remote
attackers to obtain sensitive information via various vectors.
Background
==========
OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer
(SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general
purpose cryptography library.
* The Montgomery ladder implementation of OpenSSL improperly handles
swap operations (CVE-2014-0076).
Impact
======
A remote attacker could exploit these issues to disclose information,
including private keys or other sensitive information, or perform
side-channel attacks to obtain ECDSA nonces.
Workaround
==========
Disabling the tls-heartbeat USE flag (enabled by default) provides a
workaround for the CVE-2014-0160 issue.
Resolution
==========
All OpenSSL users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1g"
Note: All services using OpenSSL to provide TLS connections have to be
restarted for the update to take effect. Utilities like
app-admin/lib_users can aid in identifying programs using OpenSSL.
As private keys may have been compromised using the Heartbleed attack,
it is recommended to regenerate them.
References
==========
[ 1 ] CVE-2014-0076
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0076
[ 2 ] CVE-2014-0160
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0160
[ 3 ] Heartbleed bug website
http://heartbleed.com/
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201404-07.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
The HP SIM software itself is not vulnerable to CVE-2014-0160 ("Heartbleed").
Until the software updates are available, HP recommends restricting
administrative access to the MSA on a secure and isolated private management
network.
OpenSSL is a 3rd party product that is embedded with some of HP Software
products. This bulletin objective is to notify HP Software customers about
products affected by the Heartbleed vulnerability. This weakness
potentially allows disclosure of information protected, under normal
conditions, by the SSL/TLS protocol. The impacted products appear in the list
below are vulnerable due to embedding OpenSSL standard release software.
References: CVE-2014-0160 (SSRT101499)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Each bulletin will include a patch and/or mitigation
guideline.
Note: OpenSSL is an external product embedded in HP products.
Bulletin Applicability:
This bulletin applies to each OpenSSL component that is embedded within the
HP products listed in the security bulletin. The bulletin does not apply to
any other 3rd party application (e.g. operating system, web server, or
application server) that may be required to be installed by the customer
according instructions in the product install guide.
To learn more about HP Software Incident Response, please visit http://www8.h
p.com/us/en/software-solutions/enterprise-software-security-center/response-c
enter.html .
Software updates are available from HP Software Support Online at
http://support.openview.hp.com/downloads.jsp
HISTORY
Version:1 (rev.1) - 11 April 2014 Initial release
Version:2 (rev.2) - 13 April 2014 Added HP UCMDB Configuration Manager as
impacted, updated HP UCMDB Browser impacted versions
Version:3 (rev.3) - 17 April 2014 Added HP Software Autonomy WorkSite Server
as impacted. Please see
the table below. To obtain the updated firmware, follow the below steps to
obtain the firmware Update.
Obtain the firmware update from www.hp.com/go/support
Select "Drivers & Downloads".
Enter the product name listed in the table below into the search field.
Click on "Go".
Click on the appropriate product.
Under "Select operating system" select any Windows operating system from the
list.
Select the appropriate firmware update under "Firmware".
HP Multimedia Service Environment (MSE) 2.1.1
HP Network Interactive Voice Response (NIVR) 2.1.0, Reactive Patches 001,
002, 003
HP Network Interactive Voice Response (NIVR) 2.0.7, Reactive Patch 003
Only the MSE (ACM TMP) database set up with Replication using SSL is impacted
for the above versions. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04267749
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04267749
Version: 1
HPSBMU03024 rev.1 - HP Insight Control Server Deployment on Linux and Windows
running OpenSSL with System Management Homepage and Systems Insight Manager,
Remote Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2014-04-30
Last Updated: 2014-04-30
Potential Security Impact: Remote disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP System
Management Homepage (SMH) running on Linux and Windows and HP Systems Insight
Manager (SIM), components of HP Insight Control server deployment. This is
the OpenSSL vulnerability known as "Heartbleed" which could be exploited
remotely resulting in disclosure of information.
Insight Control server deployment packages HP System Management Homepage
(SMH) and HP Systems Insight Manager (SIM) and can deploy them through the
below list of items. This bulletin will give you the information needed to
update your HP Insight Control server deployment solution.
Install HP Management Agents for Windows x86/x64
Install HP Management Agents for RHEL 5 x64
Install HP Management Agents for RHEL 6 x64
Install HP Management Agents for SLES 10 x64
Install HP Management Agents for SLES 11 x64
References: CVE-2014-0160 (SSRT101538)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, v7.2.2
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2014-0160 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP is actively working to address this vulnerability for the impacted
versions of HP Insight Control server deployment. This bulletin may be
revised. It is recommended that customers take the following approaches
depending on the version of HP Insight Control server deployment:
To address the vulnerability in an initial installation of HP Insight Control
server deployment v7.1.2, v7.2.0, v7.2.1, and v7.2.2 only follow steps 1
through Step 3 of the following procedure, before initiating an operating
system deployment.
To address the vulnerability in a previous installation of HP Insight Control
server deployment v7.1.2, v7.2.0, v7.2.1, and v7.2.2 follow all steps in the
following procedure.
Delete the smhamd64-*.exe/smhx86-*.exe" from Component Copy Location listed
in the following table, row 1,2,3,4.
Delete the affected hpsmh-7.*.rpm" from Component Copy Location listed in the
following table, row 5.
In sequence, perform the steps from left to right in the following table.
First, download components from Download Link; Second, rename the component
as suggested in Rename to. Third, copy the component to the location
suggested in Component Copy Location.
Table Row Number
Download Link
Rename to
Component Copy Location
1
http://www.hp.com/swpublishing/MTX-d1488fd987894bc4ab3fe0ef52
smhx86-cp023242.exe
\\express\hpfeatures\hpagents-ws\components\Win2003
2
http://www.hp.com/swpublishing/MTX-4575754bbb614b58bf0ae1ac37
smhamd64-cp023243.exe
\\express\hpfeatures\hpagents-ws\components\Win2003
3
http://www.hp.com/swpublishing/MTX-2e19c856f0e84e20a14c63ecd0
smhamd64-cp023240.exe
\\express\hpfeatures\hpagents-ws\components\Win2008
4
http://www.hp.com/swpublishing/MTX-41199f68c1144acb84a5798bf0
smhx86-cp023239.exe
\\express\hpfeatures\hpagents-ws\components\Win2008
5
http://www.hp.com/swpublishing/MTX-bfd3c0fb11184796b9428ced37
Do not rename the downloaded component for this step.
\\express\hpfeatures\hpagents-sles11-x64\components
\\express\hpfeatures\hpagents-sles10-x64\components
\\express\hpfeatures\hpagents-rhel5-x64\components
\\express\hpfeatures\hpagents-rhel6-x64\components
Table 1
Initiate Install HP Management Agents for SLES 11 x64 on targets running
SLES11 x64.
Initiate Install HP Management Agents for SLES 10 x64 on targets running
SLES10 x64.
Initiate Install HP Management Agents for RHEL 6 x64 on targets running RHEL
6 x64.
Initiate Install HP Management Agents for RHEL 5 x64 on targets running RHEL
5 x64.
Initiate Install HP Management Agents for Windows x86/x64 on targets running
Windows.
Refer to the System Management Homepage security bulletin HPSBMU02998 for
steps to take after SMH is updated to a version that is not impacted by
Heartbleed, such as changing SMH passwords, and revoking SMH certificates if
imported into HP Systems Insight Manager (two-way trust feature).
If you have HP Systems Insight Manager versions v7.3 or v7.3.1 installed,
refer to security bulletin HPSBMU03022
Related security bulletins:
For System Management Homepage please see Security bulletin HPSBMU02998 https
://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04
239372
For Systems Insight Manager please see Security bulletin HPSBMU03022 https://
h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04263
236
HISTORY
Version:1 (rev.1) - 30 April 2014 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlNhWIkACgkQ4B86/C0qfVlS4gCg3dawaqV9bzwlWOK6Rvo7GBoe
3DIAnjRKVuvFS/HhR5BfuJqFtZdIT5Hc
=lLVw
-----END PGP SIGNATURE-----
| VAR-201404-0334 | CVE-2014-2384 | Windows Run on VMware Workstation and VMware Player of vmx86.sys Service disruption in (DoS) Vulnerabilities |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
vmx86.sys in VMware Workstation 10.0.1 build 1379776 and VMware Player 6.0.1 build 1379776 on Windows might allow local users to cause a denial of service (read access violation and system crash) via a crafted buffer in an IOCTL call. NOTE: the researcher reports "Vendor rated issue as non-exploitable.". VMware Player is a free software that allows PC users to easily run virtual machines on Windows or Linux PCs. VMWare Workstation is a popular virtual machine application. Allows a local attacker to cause a blue screen, causing the system to crash.
Local attackers with access to a guest operating system can exploit this issue to crash the host operating system, effectively denying service to legitimate users.
The Blue Screen is triggered because the vulnerable function doesn\x92t
check if a pointer to a memory page is valid or not, thus causing a
memory access violation by trying to read from an unallocated memory page.
Further details at:
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2384/
Copyright:
Copyright (c) Portcullis Computer Security Limited 2014, All rights
reserved worldwide. Permission is hereby granted for the electronic
redistribution of this information. It is not to be edited or altered in
any way without the express written consent of Portcullis Computer
Security Limited.
Disclaimer:
The information herein contained may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties, implied or otherwise, with regard to this information
or its use. Any use of this information is at the user's risk. In no
event shall the author/distributor (Portcullis Computer Security
Limited) be held liable for any damages whatsoever arising out of or in
connection with the use or spread of this information
| VAR-201404-0447 | CVE-2014-2925 | ASUS RT-AC68U And other RT Series router firmware Advanced_Wireless_Content.asp Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Advanced_Wireless_Content.asp in ASUS RT-AC68U and other RT series routers with firmware before 3.0.0.4.374.5047 allows remote attackers to inject arbitrary web script or HTML via the current_page parameter to apply.cgi. ASUS RT-AC68U is a router device. A remote attacker can exploit a vulnerability to build a malicious URI, entice a user to resolve, obtain sensitive cookies, hijack a session, or perform malicious operations on the client.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The vulnerability stems from the fact that the apply.cgi script does not filter the 'current_page' parameter correctly
| VAR-201404-0581 | CVE-2014-2144 | Cisco IOS XR Software ICMPv6 Processing Denial of Service Vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Cisco IOS XR does not properly throttle ICMPv6 redirect packets, which allows remote attackers to cause a denial of service (IPv4 and IPv6 transit outage) via crafted redirect messages, aka Bug ID CSCum14266. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A denial of service vulnerability exists in Cisco IOS XR.
Attackers can exploit this issue to cause all or most of the IPv4 and IPv6 traffic to fail while being processed on an affected device, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCum14266. The vulnerability is caused by the program not properly managing ICMPv6 redirected packets
| VAR-201404-0582 | CVE-2014-2145 | Cisco Unity Connection Messaging API Vulnerable to directory traversal |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
Directory traversal vulnerability in the messaging API in Cisco Unity Connection allows remote authenticated users to read arbitrary files via vectors related to unenforced access constraints for .wav files and the audio/x-wav MIME type, aka Bug ID CSCun91071. Cisco Unity Connection is prone to a directory-traversal vulnerability.
Exploiting this issue can allow an attacker to gain access to arbitrary files. Information harvested may aid in launching further attacks.
This issue is being tracked by Cisco Bug ID CSCun91071. The platform can use voice commands to make calls or listen to messages "hands-free"
| VAR-201404-0476 | CVE-2014-0331 | Fortinet FortiADC D-series contains a cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the web administration interface in FortiADC with firmware before 3.2.1 allows remote attackers to inject arbitrary web script or HTML via the locale parameter to gui_partA/. (CWE-79). Fortinet Provided by FortiADC Contains a cross-site scripting vulnerability. Fortinet Provided by FortiADC Is /FortiADC/gui_partA/?locale=en of locale There is a problem with parameter processing and cross-site scripting (CWE-79) Vulnerabilities exist.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
FortiADC versions 3.2.0 and prior are vulnerable. FortiADC is an application delivery controller from Fortinet, which optimizes network availability, user experience, mobile performance and cloud-based enterprise application control, and enhances server efficiency and reduces data center network complexity. and cost. The vulnerability is due to the fact that the gui_partA/ URI does not adequately filter the 'locale' parameter
| VAR-201404-0565 | CVE-2014-2114 | Cisco Emergency Responder Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in UserServlet in Cisco Emergency Responder (ER) 8.6 and earlier allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCun24384. It ensures that Cisco Callmanager can transfer emergency calls directly to the appropriate Public Safety Answering Point (PSAP).
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCun24384. The software provides features such as real-time location tracking database and caller's location
| VAR-201404-0566 | CVE-2014-2115 | Cisco Emergency Responder Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Multiple cross-site request forgery (CSRF) vulnerabilities in CERUserServlet pages in Cisco Emergency Responder (ER) 8.6 and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCun24250. This vulnerability Bug ID CSCun24250 It is released as.A third party may be able to hijack the authentication of any user. It ensures that Cisco Callmanager can transfer emergency calls directly to the appropriate Public Safety Answering Point (PSAP).
Exploiting the issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks.
This issue is being tracked by Cisco Bug ID CSCun24250. The software provides features such as real-time location tracking database and caller's location
| VAR-201404-0567 | CVE-2014-2116 | Cisco Emergency Responder In Web Page insertion vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cisco Emergency Responder (ER) 8.6 and earlier allows remote attackers to inject web pages and modify dynamic content via unspecified parameters, aka Bug ID CSCun37882. The Cisco Emergency Responder (ER) enhances the emergency call capabilities of Cisco CallManager. It ensures that Cisco Callmanager can transfer emergency calls directly to the appropriate Public Safety Answering Point (PSAP).
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
These issues are being tracked by Cisco Bug ID CSCun37882. The software provides features such as real-time location tracking database and caller's location
| VAR-201404-0568 | CVE-2014-2117 | Cisco Emergency Responder Open redirect vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple open redirect vulnerabilities in Cisco Emergency Responder (ER) 8.6 and earlier allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified parameters, aka Bug ID CSCun37909. Cisco Emergency Responder (ER) Contains an open redirect vulnerability. It ensures that Cisco Callmanager can transfer emergency calls directly to the appropriate Public Safety Answering Point (PSAP).
An attacker can leverage this issue by constructing a crafted URI and enticing a user to follow it. When an unsuspecting victim follows the link, they may be redirected to an attacker-controlled site; this may aid in phishing attacks. Other attacks are possible.
This issue is being tracked by Cisco Bug ID CSCun37909. The software provides features such as real-time location tracking database and caller's location
| VAR-201404-0580 | CVE-2014-2143 | Cisco IOS and IOS XE of IKE Service disruption in implementations (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The IKE implementation in Cisco IOS 15.4(1)T and earlier and IOS XE allows remote attackers to cause a denial of service (security-association drop) via crafted Main Mode packets, aka Bug ID CSCun31021. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. The fake IKE Main Mode packet was not processed correctly due to the program. This allows unauthenticated remote attackers to remove security associations that have already been established on the affected device.
This issue is being tracked by Cisco Bug ID CSCun31021
| VAR-202003-1222 | CVE-2014-2722 | plural FortiBalancer Inappropriate default permissions in the product |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
In FortiBalancer 400, 1000, 2000 and 3000, a platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect. plural FortiBalancer The product contains a vulnerability related to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The FortiBalancer Series is an application delivery controller device. FortiBalancer is prone to a security-bypass vulnerability. This may lead to further attacks.
FortiBalancer 400, 1000, 2000, and 3000 are vulnerable
| VAR-202003-1223 | CVE-2014-2723 | plural FortiBalancer Inappropriate default permissions in the product |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
In FortiBalancer 400, 1000, 2000 and 3000, a platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect. plural FortiBalancer The product contains a vulnerability related to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The FortiBalancer Series is an application delivery controller device. FortiBalancer is prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and gain unauthorized access. This may lead to further attacks.
FortiBalancer 400, 1000, 2000, and 3000 are vulnerable
| VAR-201404-0461 | CVE-2014-0337 | Huawei Echo Life HG8247 optical router XSS vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the web interface on Huawei Echo Life HG8247 routers with software before V100R006C00SPC127 allows remote attackers to inject arbitrary web script or HTML via an invalid TELNET connection attempt with a crafted username that is not properly handled during construction of the "failed log-in attempts over telnet" log view. CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') http://cwe.mitre.org/data/definitions/79.htmlAn arbitrary script may be executed on the user's web browser. Or hijack a user session.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
Echo Life HG8247 running firmware versions V1R006C00S120 and prior are vulnerable