VARIoT IoT vulnerabilities database
| VAR-201310-0503 | CVE-2013-5519 | Cisco Wireless LAN Controller Cross-site scripting vulnerability in device management interface |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the management interface on Cisco Wireless LAN Controller (WLC) devices allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuf77810.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCuf77810
| VAR-201310-0721 | No CVE | IBC Solar ServeMaster TLP+ 'setup_comm_smtp.tcl' has multiple information disclosure vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
IBC Solar ServeMaster TLP+ contains a security vulnerability in /cgi-bin/setup_comm_smtp.tcl that allows authentication credentials to be sent in clear text over HTTP, allowing an attacker to obtain SMTP server authentication information. IBC Solar ServeMaster TLP + is an inverter device for photovoltaic power generation system of IBC Solar, Germany.
An information disclosure vulnerability exists in IBC Solar ServeMaster TLP +. Attackers can use this vulnerability to gain access to sensitive information by sniffing the network. Successful exploits will lead to other attacks
| VAR-201310-0705 | No CVE | IBC Solar ServeMaster TLP+ WEB Interface Default Account Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The IBC Solar ServeMaster TLP+ WEB interface has a default account and the 'admin' password is 'admin', allowing an attacker to gain access to the device using that account. IBC Solar ServeMaster TLP + is an inverter device for photovoltaic power generation system of IBC Solar, Germany.
A security bypass vulnerability exists in IBC Solar ServeMaster TLP +, which originates from the use of hard-coded certificates for programs. A remote attacker could use this vulnerability to gain access to an affected device
| VAR-201310-0543 | CVE-2013-5517 | Cisco Unified Communications Domain Manager of Web In the framework SQL Injection vulnerability |
CVSS V2: 5.5 CVSS V3: - Severity: MEDIUM |
SQL injection vulnerability in the web framework in Cisco Unified Communications Domain Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted URL, aka Bug ID CSCuh96567.
Exploiting this issue could allow an authenticated attacker to compromise the affected application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This issue is tracked by Cisco Bug ID CSCuh96567. This component features scalable, distributed, and highly available enterprise Voice over IP call processing
| VAR-201310-0390 | CVE-2013-5944 | Siemens SCALANCE X-200 and X-200IRT Vulnerability to execute administrator actions in switch firmware |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The integrated web server on Siemens SCALANCE X-200 switches with firmware before 4.5.0 and X-200IRT switches with firmware before 5.1.0 does not properly enforce authentication requirements, which allows remote attackers to perform administrative actions via requests to the management interface. The Siemens Scalance X200 is an industrial Ethernet switch from Siemens. SCALANCE X-200 and X-200IRT series switches are prone to an authentication-bypass vulnerability.
Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and gain administrative access to the affected device.
The following products are affected.
SCALANCE X-200 running firmware versions prior to 4.5.0
SCALANCE X-200IRT running firmware versions prior to 5.1.0
| VAR-201309-0573 | No CVE | Tenda W309R Router Cookie Verification Bypass Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The Tenda W309R Router WEB console does not have a correct COOKIE management mechanism, which allows an attacker to access the router device without providing a password. Tenda W309R is a wireless router product from China's Tenda.
An authentication bypass vulnerability exists in the Tenda W309R router. An attacker could use this vulnerability to gain access to affected devices and sensitive information. There are vulnerabilities in Tenda W309R version 5.07.46, other versions may also be affected
| VAR-201310-0803 | No CVE | Unknown arbitrary command execution vulnerability in Hitachi JP1 / Base |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
Hitachi JP1 is a solution that monitors the execution of business and centrally manages system content such as OS and applications.
Hitachi JP1 / Base has an unknown vulnerability in processing messages sent by some hosts, allowing remote attackers to use the vulnerability to execute arbitrary commands. Hitachi JP1/Base is prone to an unspecified arbitrary command-execution vulnerability.
Local attacker can exploit this issue to execute arbitrary commands within the context of the vulnerable application
| VAR-201309-0572 | No CVE | Unknown arbitrary command execution vulnerability in Hitachi JP1 / Automatic Job Management System |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Hitachi JP1 is a solution that monitors the execution of business and centrally manages system content such as OS and applications. Hitachi JP1 / Automatic Job Management System is a set of job management systems from Hitachi, Japan. The system supports scheduling, job error notifications, and visualization of job health.
A remote arbitrary command execution vulnerability exists in Hitachi JP1 / Automatic Job Management System. An attacker could use this vulnerability to execute arbitrary commands in the context of an affected application
| VAR-201310-0017 | CVE-2012-4102 | Cisco Unified Computing System Authenticated Vulnerability in Fabric Interconnect Component |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The activate firmware command in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq02600. Cisco Unified Computing System is prone to a local arbitrary command-execution vulnerability.
A local attacker can exploit this issue to execute arbitrary commands on the Linux shell with root privileges. Successful exploits may completely compromise the affected device.
This issue is being tracked by Cisco Bug ID CSCtq02600. The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
| VAR-201310-0018 | CVE-2012-4103 | Cisco Unified Computing System Authenticated Vulnerability in Fabric Interconnect Component |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
ethanalyzer in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq02686. Cisco Unified Computing System (UCS) Of fabric interconnect components ethanalyzer Contains a privileged vulnerability.
A local attacker can exploit this issue to execute arbitrary commands with elevated privileges. Successful exploits may compromise the affected device.
This issue is being tracked by Cisco Bug ID CSCtq02686. The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology. A security vulnerability exists in the 'ethanalyzer' command in the fabric-interconnect component of Cisco UCS due to the program not properly filtering user-submitted input
| VAR-201310-0019 | CVE-2012-4104 | Cisco Unified Computing System Absolute path traversal vulnerability in fabric interconnect components |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
Absolute path traversal vulnerability in the image-download process in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to overwrite or delete arbitrary files via a full pathname in an image header, aka Bug ID CSCtq02706. Cisco Unified Computing System is prone to a directory-traversal vulnerability.
Exploiting this issue will allow a local attacker to modify or delete arbitrary files on the filesystem.
This issue is tracked by Cisco BugID CSCtq02706. The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
| VAR-201310-0024 | CVE-2012-4109 | Cisco Unified Computing System Authenticated Vulnerability in Fabric Interconnect Component |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The clear sshkey command in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq86559.
A local attacker can exploit this issue to execute arbitrary commands with root privileges. Successful exploits may compromise the affected device.
This issue is being tracked by Cisco Bug ID CSCtq86559. Cisco Unified Computing System (UCS) is a unified computing system of Cisco (Cisco). The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
| VAR-201310-0025 | CVE-2012-4110 | Cisco Unified Computing System Authenticated Vulnerability in Fabric Interconnect Component |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
run-script in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq86560. Cisco Unified Computing System (UCS) Of fabric interconnect components run-script Contains a privileged vulnerability.
A local attacker can exploit this issue to execute arbitrary commands with root privileges. Successful exploits may compromise the affected device.
This issue being tracked by Cisco Bug ID CSCtq86560. The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology. A security vulnerability exists in the 'run-script' command in the fabric-interconnect component of Cisco UCS due to the program not properly filtering user-submitted input
| VAR-201310-0026 | CVE-2012-4111 | Cisco Unified Computing System Authenticated Vulnerability in Fabric Interconnect Component |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The create certreq command in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq86563. Cisco Unified Computing System is prone to a local command-injection vulnerability.
A local attacker can exploit this issue to execute arbitrary commands with root privileges. Successful exploits may compromise the affected device.
This issue being tracked by Cisco Bug ID CSCtq86563. The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
| VAR-201310-0011 | CVE-2012-4096 | Cisco Unified Computing System of Baseboard Management Controller Vulnerability gained in |
CVSS V2: 6.2 CVSS V3: - Severity: MEDIUM |
The local file editor in the Baseboard Management Controller (BMC) in Cisco Unified Computing System (UCS) allows local users to gain privileges and modify arbitrary fabric-interconnect files, in the context of a vi process, via unspecified commands, aka Bug ID CSCtn06574. Cisco Unified Computing System is prone to a local arbitrary file-access vulnerability.
Local attackers can exploit this issue to read or overwrite arbitrary files. This may lead to further attacks.
This issue being tracked by Cisco Bug ID CSCtn06574. The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
| VAR-201310-0542 | CVE-2013-5516 | Cisco TelePresence Multipoint Switch Device Media Snapshot Service disruption in implementations (DoS) Vulnerabilities |
CVSS V2: 6.3 CVSS V3: - Severity: MEDIUM |
The Media Snapshot implementation on Cisco TelePresence Multipoint Switch (CTMS) devices allows remote authenticated users to cause a denial of service (device reload) by sending many Media Snapshot requests at the time of a meeting termination, aka Bug ID CSCuh44796. The Cisco TelePresence Multipoint Switch is a telepresence multipoint switch developed by Cisco.
Successfully exploiting this issue allows remote attackers to cause a denial of service condition.
This issue is being tracked by Cisco Bug ID CSCuh44796. The switch enables dispersed enterprises to conduct telepresence meetings across multiple locations and provides a means of switching between each location or a single screen
| VAR-201310-0010 | CVE-2012-4095 | Cisco Unified Computing System Vulnerability in Microsoft Fabric Interconnect Component |
CVSS V2: 5.5 CVSS V3: - Severity: MEDIUM |
The local file editor in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges, and read or modify arbitrary files, via unspecified key bindings, aka Bug ID CSCtn04521. This may lead to further attacks.
This issue is tracked by Cisco Bug ID CSCtn04521. Cisco Unified Computing System (UCS) is a unified computing system of Cisco (Cisco). The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
| VAR-201309-0566 | No CVE | ASUS RT-N66U 'apply.cgi' Cross-Site Request Forgery Vulnerability |
CVSS V2: 3.5 CVSS V3: - Severity: LOW |
ASUS RT-N66U 'apply.cgi' has a cross-site request forgery that allows remote attackers to exploit vulnerabilities to build malicious URIs, to trick users into parsing, and to execute arbitrary commands in the target user context. ASUS RT-N66U is a wireless router product from ASUS.
A cross-site request forgery vulnerability exists in ASUS RT-N66U. An unauthorized attacker could use this vulnerability to perform administrator actions to gain access to the affected device. There are vulnerabilities in ASUS RT-N66U 3.0.0.4.374_720. Other versions may also be affected
| VAR-201309-0593 | No CVE | D-Link DSL-2740B Router Cross-Site Request Forgery Vulnerability |
CVSS V2: 3.5 CVSS V3: - Severity: LOW |
The D-Link DSL-2740B is a router device. D-Link DSL-2740B EU_1.00 has a cross-site request forgery vulnerability that allows an attacker to exploit a vulnerability to construct a malicious URI, to entice a user to resolve, and to perform malicious operations in the target user context, such as disabling or enabling a wireless MAC address filter, firewall Protection and so on.
| VAR-201309-0150 | CVE-2013-3417 | Cisco Video Surveillance Operations Manager Management Web Vulnerability to watch streaming video in the interface |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The administrative web interface in Cisco Video Surveillance Operations Manager does not properly perform authentication, which allows remote attackers to watch video feeds via a crafted URL, aka Bug ID CSCtg72262.
An attacker can exploit this issue to gain access to sensitive information; this may lead to further attacks.
This issue is being tracked by Cisco Bug ID CSCtg72262. This solution can provide secure configuration and management for web portal video, media server instances, cameras, etc. in the IP network