VARIoT IoT vulnerabilities database
| VAR-201403-0460 | CVE-2014-2234 | Apple OS X of OpenSSL Specific for Apple Vulnerabilities in patches that prevent additional validation within custom applications |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
A certain Apple patch for OpenSSL in Apple OS X 10.9.2 and earlier uses a Trust Evaluation Agent (TEA) feature without terminating certain TLS/SSL handshakes as specified in the SSL_CTX_set_verify callback function's documentation, which allows remote attackers to bypass extra verification within a custom application via a crafted certificate chain that is acceptable to TEA but not acceptable to that application. Apple Mac OS X is prone to a security-bypass vulnerability.
Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks and bypass certain security restrictions. A remote attacker could exploit this vulnerability with a specially crafted certificate chain to bypass authentication
| VAR-201402-0350 | CVE-2014-0774 | Schneider Electric OPC Factory Server of C++ Sample client stack-based buffer overflow vulnerability |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
Stack-based buffer overflow in the C++ sample client in Schneider Electric OPC Factory Server (OFS) TLXCDSUOFS33 - 3.35, TLXCDSTOFS33 - 3.35, TLXCDLUOFS33 - 3.35, TLXCDLTOFS33 - 3.35, and TLXCDLFOFS33 - 3.35 allows local users to gain privileges via vectors involving a malformed configuration file. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Schneider Electric OFS Client. User interaction is required to exploit this vulnerability in that the target must load a malicious file.The specific flaw exists within the parsing of the configuration file. A crafted configuration file will result in an exploitable stack buffer overflow. An attacker can use this to execute arbitrary code in the context of the OFS Client. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. The SESU tool used by several of these products is used to update software on Windows PC systems. Failed exploit attempts will result in a denial-of-service condition. Schneider Electric OPC Factory Server (OFS) is a set of data communication editing software of French Schneider Electric (Schneider Electric). The software supports important information access, open page design, transparent architecture and interoperability, etc., enabling users to obtain good process and communication effects. The following versions are affected: Schneider Electric OFS TLXCDSUOFS33 - version 3.35, TLXCDSTOFS33 - version 3.35, TLXCDLUOFS33 - version 3.35, TLXCDLTOFS33 - version 3.35, TLXCDLFOFS33 - version 3.35
| VAR-201403-0508 | CVE-2014-0101 | Linux kernel Code problem vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk. The Linux kernel is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to crash the affected computer, denying service to legitimate users. The NFSv4 implementation is one of the distributed file system protocols. The vulnerability stems from the fact that the program does not verify the auth_enable and auth_capable fields before calling sctp_sf_authenticate.
This update also fixes several bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2014:0419-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0419.html
Issue date: 2014-04-22
CVE Names: CVE-2014-0101
=====================================================================
1. Summary:
Updated kernel packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 6.3 Extended Update Support.
The Red Hat Security Response Team has rated this update as having
Important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Compute Node EUS (v. 6.3) - noarch, x86_64
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3) - x86_64
Red Hat Enterprise Linux Server EUS (v. 6.3) - i386, noarch, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 6.3) - i386, ppc64, s390x, x86_64
3.
* A flaw was found in the way the Linux kernel processed an authenticated
COOKIE_ECHO chunk during the initialization of an SCTP connection. (CVE-2014-0101, Important)
Red Hat would like to thank Nokia Siemens Networks for reporting this
issue.
This update also fixes the following bug:
* Due to an incorrect call of the weak-modules script in the kernel spec
file, the weak-modules directory was removed from the system when removing
or upgrading certain kernel packages related to weak-modules, such as
kernel-debug. With this update, the weak-modules call in the kernel spec
file has been corrected, and the script now preserves the weak-modules
directory on the system in this scenario. (BZ#1076599)
All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.
5. Bugs fixed (https://bugzilla.redhat.com/):
1070705 - CVE-2014-0101 kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
6. Package List:
Red Hat Enterprise Linux Compute Node EUS (v. 6.3):
Source:
kernel-2.6.32-279.43.1.el6.src.rpm
noarch:
kernel-doc-2.6.32-279.43.1.el6.noarch.rpm
kernel-firmware-2.6.32-279.43.1.el6.noarch.rpm
x86_64:
kernel-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debug-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-279.43.1.el6.x86_64.rpm
kernel-devel-2.6.32-279.43.1.el6.x86_64.rpm
kernel-headers-2.6.32-279.43.1.el6.x86_64.rpm
perf-2.6.32-279.43.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3):
Source:
kernel-2.6.32-279.43.1.el6.src.rpm
x86_64:
kernel-debug-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-279.43.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
python-perf-2.6.32-279.43.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.3):
Source:
kernel-2.6.32-279.43.1.el6.src.rpm
i386:
kernel-2.6.32-279.43.1.el6.i686.rpm
kernel-debug-2.6.32-279.43.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-279.43.1.el6.i686.rpm
kernel-debug-devel-2.6.32-279.43.1.el6.i686.rpm
kernel-debuginfo-2.6.32-279.43.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-279.43.1.el6.i686.rpm
kernel-devel-2.6.32-279.43.1.el6.i686.rpm
kernel-headers-2.6.32-279.43.1.el6.i686.rpm
perf-2.6.32-279.43.1.el6.i686.rpm
perf-debuginfo-2.6.32-279.43.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-279.43.1.el6.i686.rpm
noarch:
kernel-doc-2.6.32-279.43.1.el6.noarch.rpm
kernel-firmware-2.6.32-279.43.1.el6.noarch.rpm
ppc64:
kernel-2.6.32-279.43.1.el6.ppc64.rpm
kernel-bootwrapper-2.6.32-279.43.1.el6.ppc64.rpm
kernel-debug-2.6.32-279.43.1.el6.ppc64.rpm
kernel-debug-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm
kernel-debug-devel-2.6.32-279.43.1.el6.ppc64.rpm
kernel-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm
kernel-debuginfo-common-ppc64-2.6.32-279.43.1.el6.ppc64.rpm
kernel-devel-2.6.32-279.43.1.el6.ppc64.rpm
kernel-headers-2.6.32-279.43.1.el6.ppc64.rpm
perf-2.6.32-279.43.1.el6.ppc64.rpm
perf-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm
python-perf-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm
s390x:
kernel-2.6.32-279.43.1.el6.s390x.rpm
kernel-debug-2.6.32-279.43.1.el6.s390x.rpm
kernel-debug-debuginfo-2.6.32-279.43.1.el6.s390x.rpm
kernel-debug-devel-2.6.32-279.43.1.el6.s390x.rpm
kernel-debuginfo-2.6.32-279.43.1.el6.s390x.rpm
kernel-debuginfo-common-s390x-2.6.32-279.43.1.el6.s390x.rpm
kernel-devel-2.6.32-279.43.1.el6.s390x.rpm
kernel-headers-2.6.32-279.43.1.el6.s390x.rpm
kernel-kdump-2.6.32-279.43.1.el6.s390x.rpm
kernel-kdump-debuginfo-2.6.32-279.43.1.el6.s390x.rpm
kernel-kdump-devel-2.6.32-279.43.1.el6.s390x.rpm
perf-2.6.32-279.43.1.el6.s390x.rpm
perf-debuginfo-2.6.32-279.43.1.el6.s390x.rpm
python-perf-debuginfo-2.6.32-279.43.1.el6.s390x.rpm
x86_64:
kernel-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debug-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-279.43.1.el6.x86_64.rpm
kernel-devel-2.6.32-279.43.1.el6.x86_64.rpm
kernel-headers-2.6.32-279.43.1.el6.x86_64.rpm
perf-2.6.32-279.43.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 6.3):
Source:
kernel-2.6.32-279.43.1.el6.src.rpm
i386:
kernel-debug-debuginfo-2.6.32-279.43.1.el6.i686.rpm
kernel-debuginfo-2.6.32-279.43.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-279.43.1.el6.i686.rpm
perf-debuginfo-2.6.32-279.43.1.el6.i686.rpm
python-perf-2.6.32-279.43.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-279.43.1.el6.i686.rpm
ppc64:
kernel-debug-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm
kernel-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm
kernel-debuginfo-common-ppc64-2.6.32-279.43.1.el6.ppc64.rpm
perf-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm
python-perf-2.6.32-279.43.1.el6.ppc64.rpm
python-perf-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm
s390x:
kernel-debug-debuginfo-2.6.32-279.43.1.el6.s390x.rpm
kernel-debuginfo-2.6.32-279.43.1.el6.s390x.rpm
kernel-debuginfo-common-s390x-2.6.32-279.43.1.el6.s390x.rpm
kernel-kdump-debuginfo-2.6.32-279.43.1.el6.s390x.rpm
perf-debuginfo-2.6.32-279.43.1.el6.s390x.rpm
python-perf-2.6.32-279.43.1.el6.s390x.rpm
python-perf-debuginfo-2.6.32-279.43.1.el6.s390x.rpm
x86_64:
kernel-debug-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-279.43.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
python-perf-2.6.32-279.43.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2014-0101.html
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFTVqvnXlSAg2UNWIIRAskwAKDFhD3zS1sh/vhrk31MzjZjFuD8kwCfdeRV
1nSgXH01tADV2vYadphGfKs=
=2Sa7
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. (CVE-2014-2672)
Adhemerval Zanella Neto discovered a flaw the in the Transactional Memory
(TM) implementation for powerpc based machine. ============================================================================
Ubuntu Security Notice USN-2223-1
May 27, 2014
linux-lts-quantal vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-lts-quantal: Linux hardware enablement kernel from Quantal
Details:
Matthew Daley reported an information leak in the floppy disk driver of the
Linux kernel. An unprivileged local user could exploit this flaw to obtain
potentially sensitive information from kernel memory. (CVE-2014-1738)
Matthew Daley reported a flaw in the handling of ioctl commands by the
floppy disk driver in the Linux kernel. An unprivileged local user could
exploit this flaw to gain administrative privileges if the floppy disk
module is loaded. (CVE-2014-1737)
A flaw was discovered in the Linux kernel's IPC reference counting. (CVE-2014-0055)
A flaw was discovered in the handling of network packets when mergeable
buffers are disabled for virtual machines in the Linux kernel. Guest OS
users may exploit this flaw to cause a denial of service (host OS crash) or
possibly gain privilege on the host OS. (CVE-2014-0077)
A flaw was discovered in the Linux kernel's handling of the SCTP handshake. (CVE-2014-0101)
A flaw was discovered in the handling of routing information in Linux
kernel's IPv6 stack. A remote attacker could exploit this flaw to cause a
denial of service (memory consumption) via a flood of ICMPv6 router
advertisement packets. (CVE-2014-2309)
An error was discovered in the Linux kernel's DCCP protocol support. A
remote attacked could exploit this flaw to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2014-2523)
Max Sydorenko discovered a race condition in the Atheros 9k wireless driver
in the Linux kernel. (CVE-2014-2672)
An error was discovered in the Reliable Datagram Sockets (RDS) protocol
stack in the Linux kernel.
(CVE-2014-2678)
Yaara Rozenblum discovered a race condition in the Linux kernel's Generic
IEEE 802.11 Networking Stack (mac80211). (CVE-2014-2706)
A flaw was discovered in the Linux kernel's ping sockets. An unprivileged
local user could exploit this flaw to cause a denial of service (system
crash) or possibly gain privileges via a crafted application.
(CVE-2014-2851)
Sasha Levin reported a bug in the Linux kernel's virtual memory management
subsystem. (CVE-2014-3122)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.5.0-51-generic 3.5.0-51.76~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well
| VAR-201403-0474 | CVE-2014-2104 | Cisco Unified Communications Domain Manager of Business Voice Services Manager Page cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in the Business Voice Services Manager (BVSM) page in Cisco Unified Communications Domain Manager 9.0(.1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCum78536, CSCum78526, CSCum69809, and CSCum63113. Vendors have confirmed this vulnerability Bug ID CSCum78536 , CSCum78526 , CSCum69809 and CSCum63113 It is released as.By any third party through unspecified parameters Web Script or HTML May be inserted.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
These issues are being tracked by Cisco Bug ID's CSCum78536, CSCum78526, CSCum69809, and CSCum63113. This component features scalable, distributed, and highly available enterprise Voice over IP call processing
| VAR-201402-0383 | CVE-2014-2103 | Cisco Intrusion Prevention System Service disruption in software (DoS) Vulnerabilities |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cisco Intrusion Prevention System (IPS) Software allows remote attackers to cause a denial of service (MainApp process outage) via malformed SNMP packets, aka Bug IDs CSCum52355 and CSCul49309. Vendors have confirmed this vulnerability Bug ID CSCum52355 and CSCul49309 It is released as.Malformed by a third party SNMP Service disruption via packets (MainApp Stop process ) There is a possibility of being put into a state.
Attackers can exploit this issue to cause the MainApp process to become unresponsive, which leads to denial-of-service conditions.
This issue is being tracked by Cisco Bug ID CSCum52355 and CSCul49309. The system can immediately interrupt, adjust or isolate some abnormal or harmful network data transmission behaviors
| VAR-201402-0439 | No CVE | SAP BusinessObjects Explorer SBOP Resource Manager Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
BusinessObjects Explorer is a data discovery application. SAP BusinessObjects Explorer SBOP Resource Manager has an information disclosure vulnerability that allows an attacker to access potentially sensitive information
| VAR-201402-0349 | CVE-2014-0759 | Schneider Electric Floating License Manager Privilege Escalation Vulnerability |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
Unquoted Windows search path vulnerability in Schneider Electric Floating License Manager 1.0.0 through 1.4.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character. Supplementary information : CWE Vulnerability type by CWE-428: Unquoted Search Path or Element ( Unquoted search path or element ) Has been identified. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. The SESU tool used by several of these products is used to update software on Windows PC systems.
Attackers can leverage this issue to gain escalated privileges
| VAR-201403-0323 | CVE-2014-2264 | Synology DiskStation Manager VPN module hard-coded password vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The OpenVPN module in Synology DiskStation Manager (DSM) 4.3-3810 update 1 has a hardcoded root password of synopass, which makes it easier for remote attackers to obtain access via a VPN session. Synology Provided by DiskStation Manager Has a problem with hard-coded credentials.
Successful attacks can allow a remote attacker to gain unauthorized access to the vulnerable device. Synology DiskStation Manager (DSM) is an operating system developed by Synology for network storage servers (NAS). The operating system can manage data, documents, photos, music and other information
| VAR-201404-0291 | CVE-2013-7350 | Check Point Security Gateway Vulnerability in |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Multiple unspecified vulnerabilities in Check Point Security Gateway 80 R71.x before R71.45 (730159141) and R75.20.x before R75.20.4 and 600 and 1100 appliances R75.20.x before R75.20.42 have unknown impact and attack vectors related to "important security fixes.". Founded in 1993, Check Point Software Technologies is headquartered in Redwood City, Calif., and is the world's leading provider of Internet security solutions, leading the global enterprise firewall, personal firewall and virtual private network (VPN) markets. There are multiple vulnerabilities in Check Point's multiple products. There are currently no detailed vulnerability descriptions.
The impact of these issues is currently unknown. We will update this BID as more information emerges.
The following products are affected:
Security Gateway 80 R71.x and R75.20.x
600 Appliance R75.20.x
1100 Appliance R75.20.x. Please keep an eye on the cnnvd website or manufacturer announcements
| VAR-201402-0191 | CVE-2014-0679 | Cisco Prime Infrastructure In root Vulnerability to execute arbitrary commands with privileges |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Cisco Prime Infrastructure 1.2 and 1.3 before 1.3.0.20-2, 1.4 before 1.4.0.45-2, and 2.0 before 2.0.0.0.294-2 allows remote authenticated users to execute arbitrary commands with root privileges via an unspecified URL, aka Bug ID CSCum71308.
An attacker can exploit this issue to execute system commands with root-level privileges.
This issue being tracked by Cisco Bug ID CSCum71308
| VAR-201402-0581 | No CVE | Inteno DG301 'username' command injection vulnerability |
CVSS V2: 3.6 CVSS V3: - Severity: LOW |
The DG301 is a high-end Multi-WAN residential gateway with advanced router and bridging capabilities. Inteno DG301 'username' has a command injection vulnerability that can be exploited by an attacker to inject and execute arbitrary shell commands due to failure to adequately filter user-supplied input.
| VAR-201402-0700 | CVE-2025-34037 | Multiple Secure Bypass Vulnerabilities in Linksys Multiple E-Series Routers |
CVSS V2: 7.5 CVSS V3: - Severity: Critical |
An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability was reported to be exploited in the wild by the "TheMoon" worm in 2014 to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. Additionally, this vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC. Linksys E-series routers are popular router devices. Multiple Linksys E-series routers have multiple security vulnerabilities that allow malicious users to bypass some of the security restrictions: 1. 2. The device fails to properly restrict access to the console, allowing an attacker to access restricted functionality through the TCP port 8083
| VAR-201403-0345 | CVE-2014-1599 | SFR Box Router firmware cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in the SFR Box router with firmware NB6-MAIN-R3.3.4 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) dns, (2) dhcp, (3) nat, (4) route, or (5) lan in network/; or (6) wifi/config. The SFR Box router is a router device.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
SFR BOX NB6-MAIN-R3.3.4 is vulnerable; other versions may also be affected. CVE-2014-1599
39 Type-1 XSS in SFR ADSL/Fiber Box.
SFR is the french Vodafone (estimated DSL user base of 5.2 Million).
* affected product:
SFR BOX NB6-MAIN-R3.3.4
* vulnerabilities:
/network/dns
5 non-filtered Type-1 XSS
/network/dhcp
6 non-filtered Type-1 XSS
/network/nat
7 non-filtered Type-1 XSS
/network/route
12 non-filtered Type-1 XSS
/wifi/config
1 non-filtered Type-1 XSS
/network/lan
8 non-filtered Type-1 XSS
* exploitation hypotheses:
- user already logged-in (or tricked by SE techniques to authenticate)
- ip address of the SFR Box router is known (most users use the default
settings: 192.168.1.1/24)
* #number of attack vectors:
39 Type-1 XSS
* exploitation scenario:
If a user is tricked into authenticating into its interface,
an attacker can XSS the user, and thus getting read and write access to
the router configuration webpages.
Such as scenario is mainly possible due to:
- non filtered reflections (mainly Type-1 / reflected)
- lack of Content Security Policy
Moreover, no anti-CSRF token such as view-states are present, thus there
is the possibility of modifying the routing tables even without an XSS,
if the user is authenticated in the box.
A non limitative list of actions include:
- getting authentication credentials (wireless, DSL credentials)
- rebooting the router
- modifying the route table (thus possibility of content injection if
an attacker controlled server is on the route)
- DDOSing a target with numerous XSS'ed clients
* timeline:
- 2013-12-21: discovery
- 2014-01-06: notification to vendor, ask for patch release
- 2014-01-06: vendor acknowledges but does not answer on the patching
timeframe
- 2014-01-20: request for update or planned date of patch release
- 2014-02-25: public disclosure
| VAR-201403-0228 | CVE-2014-2033 | Blue Coat ProxySG local user changes contain a time and state vulnerability |
CVSS V2: 7.9 CVSS V3: - Severity: HIGH |
The caching feature in SGOS in Blue Coat ProxySG 5.5 through 5.5.11.3, 6.1 through 6.1.6.3, 6.2 through 6.2.15.3, 6.4 through 6.4.6.1, and 6.3 and 6.5 before 6.5.4 allows remote authenticated users to bypass intended access restrictions during a time window after account deletion or modification by leveraging knowledge of previously valid credentials. (CWE-361). Blue Coat Provided by ProxySG Contains a vulnerability with a time lag between the change of the authentication information and the reflection. Blue Coat Provided by ProxySG Since the old authentication information is stored in the cache, the maximum time from the change of the authentication information to the reflection 15 Vulnerability with a time difference of about minutes (CWE-361) Exists. In addition, if other password-related processing such as login with a new account or denial of authentication due to an incorrect password is performed, this time difference will be reduced. CWE-361: Time and State https://cwe.mitre.org/data/definitions/361.htmlEven if the authentication information is changed, the maximum 15 You may be logged in with your old account for a minute. Blue Coat ProxySG is a set of secure Web gateway devices from Blue Coat, USA. The device provides user authentication, web filtering, data loss protection and more to control all web traffic. Blue Coat ProxySG has a security vulnerability in the SGOS caching feature
| VAR-201402-0222 | CVE-2014-0740 | Cisco Unified Communications Manager of OS Administration Component cross-site request forgery vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability in the Call Detail Records Analysis and Reporting (CAR) interface in the OS Administration component in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows remote attackers to hijack the authentication of administrators for requests that make administrative changes, aka Bug ID CSCun00701. Vendors have confirmed this vulnerability Bug ID CSCun00701 It is released as.A third party could hijack the administrator's credentials and make administrative changes.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions in the context of the affected user. Other attacks are also possible.
This issue is being tracked by Cisco bug ID CSCun00701. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
| VAR-201402-0223 | CVE-2014-0741 | Cisco Unified Communications Manager of Certificate Authority Proxy Function Vulnerable to reading arbitrary files |
CVSS V2: 6.2 CVSS V3: - Severity: MEDIUM |
The certificate-import feature in the Certificate Authority Proxy Function (CAPF) CLI implementation in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows local users to read or modify arbitrary files via a crafted command, aka Bug ID CSCum95461. Vendors report this vulnerability Bug ID CSCum95461 Published as.A local user may be able to read or modify any file via crafted commands. Cisco Unified Communications Manager is prone to a local privilege-escalation vulnerability.
A local attacker can exploit this issue to gain escalated privileges.
This issue is being tracked by Cisco Bug ID CSCum95461. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
| VAR-201402-0224 | CVE-2014-0742 | Cisco Unified Communications Manager of CSR Management function Certificate Authority Proxy Function Vulnerable to reading arbitrary files |
CVSS V2: 6.2 CVSS V3: - Severity: MEDIUM |
The Certificate Authority Proxy Function (CAPF) CLI implementation in the CSR management feature in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows local users to read or modify arbitrary files via unspecified vectors, aka Bug ID CSCum95464. Vendors have confirmed this vulnerability Bug ID CSCum95464 It is released as.Any file may be read or modified by the local user. Cisco Unified Communications Manager is prone to a local privilege-escalation vulnerability.
A local attacker can exploit this issue to gain escalated privileges.
This issue is being tracked by Cisco Bug ID CSCum95464. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
| VAR-201402-0210 | CVE-2014-0743 | Cisco Unified Communications Manager of Certificate Authority Proxy Function Vulnerabilities that bypass authentication in components |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Certificate Authority Proxy Function (CAPF) component in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows remote attackers to bypass authentication and modify registered-device information via crafted data, aka Bug ID CSCum95468. Cisco Unified Communications Manager is prone to a remote security-bypass vulnerability.
Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions.
This issue is being tracked by Cisco Bug ID CSCum95468. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
| VAR-201402-0211 | CVE-2014-0745 | Cisco Unified Contact Center Express of Unified Serviceability Sub-system cross-site request forgery vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability in the Unified Serviceability subsystem in Cisco Unified Contact Center Express (Unified CCX) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCum95502. Vendors have confirmed this vulnerability Bug ID CSCum95502 It is released as.A third party may be able to hijack the authentication of any user.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions in the context of the affected user. Other attacks are also possible.
This issue is being tracked by Cisco bug ID CSCum95502. This component integrates agent application and self-service voice service, and provides functions such as call distribution and customer access control
| VAR-201402-0212 | CVE-2014-0746 | Cisco Unified Contact Center Express Vulnerability in which important information is obtained in the disaster recovery system |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The disaster recovery system (DRS) in Cisco Unified Contact Center Express (Unified CCX) allows remote authenticated users to obtain sensitive information by reading extraneous fields in an HTML document, aka Bug ID CSCum95536.
An attacker can exploit this issue to gain access to sensitive information that may aid in further attacks.
This issue is being tracked by Cisco BugId CSCum95536. This component integrates agent application and self-service voice service, and provides functions such as call distribution and customer access control