VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201304-0025 CVE-2012-5218 HP ElitePad 900 of BIOS In BIOS Vulnerabilities that can be bypassed CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
HP ElitePad 900 PCs with BIOS F.0x before F.01 Update 1.0.0.8 do not enable the Secure Boot feature, which allows local users to bypass intended BIOS restrictions and boot unintended operating systems via unspecified vectors. The HP ElitePad 900 is a tablet for business people. A configuration vulnerability exists in the HP ElitePad 900 PCs with BIOS. HP ElitePad 900 is prone to a local security-bypass vulnerability. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03727435 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03727435 Version: 1 HPSBHF02865 SSRT101158 rev.1 - HP ElitePad 900, Secure Boot Configuration Inconsistency NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2013-04-23 Last Updated: 2013-04-23 Potential Security Impact: Secure Boot configuration inconsistency Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential vulnerability has been identified with certain HP ElitePad tablet PCs. References: CVE-2012-5218 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP ElitePad 900 with BIOS version vF.00 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2012-5218 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION To resolve this vulnerability, HP has provided a BIOS firmware update. Select "Support & Drivers" Select Drivers and Software, then enter "ElitePad 900" as the model number Select the correct model number Select the Operating System running on the ElitePad - From the product support page, download and install the "HP ElitePad 900 Driver and Firmware Update" v1.0.0.8 or later. HISTORY Version:1 (rev.1) - 23 April 2013 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430 Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2013 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iEYEARECAAYFAlF2yskACgkQ4B86/C0qfVnyDQCghwIwIgttvW0nNZywc47wYM5K YSAAoKTN1Hh9jbtU1WBqp/nMb69sONTO =L3+9 -----END PGP SIGNATURE-----
VAR-201304-0258 CVE-2013-1195 Cisco ASA Device and Cisco FWSM Run on time-based ACL Vulnerability that can bypass access restrictions CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The time-based ACL implementation on Cisco Adaptive Security Appliances (ASA) devices, and in Cisco Firewall Services Module (FWSM), does not properly handle periodic statements for the time-range command, which allows remote attackers to bypass intended access restrictions by sending network traffic during denied time periods, aka Bug IDs CSCuf79091 and CSCug45850. Vendors have confirmed this vulnerability Bug ID CSCuf79091 , CSCug45850 It is released as.A third party may be able to circumvent access restrictions by sending network traffic during the denial period. Cisco Adaptive Security Appliance (ASA) is prone to a security-bypass vulnerability. Successfully exploiting this issue will allow attackers to bypass the access list and perform unauthorized actions. This issue is tracked by Cisco Bug ID's CSCuf79091 and CSCug45850. Cisco Firewall Services Module (FWSM) is a firewall service module of Cisco, which is deployed on 6500 series switches and 7600 series routers to provide traffic acceleration. This can invalidate the time-range object
VAR-201304-0567 No CVE TRENDNet IP Camera Custom URL Processing Verification Bypass Vulnerability CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
TRENDNet IP Camera is a webcam device. A security vulnerability exists in TRENDNet IP Camera's handling of specially crafted URLs, allowing remote attackers to exploit vulnerabilities to bypass authentication restrictions and unauthorized access to devices.
VAR-201304-0481 No CVE D-LINK DIR-615/DIR-300 HTTP Header Injection Vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
The D-LINK DIR-615/DIR-300 set/runtime/diagnostic/pingIp and exeshell parameters lack sufficient validation of the input, allowing authenticated remote attackers to exploit the vulnerability to execute arbitrary OS commands. The D-LINK DIR-615/DIR-300 incorrectly restricts access to the DevInfo.txt file, allowing remote attackers to exploit the vulnerability to submit requests directly to obtain device information, including model, hardware version, linux kernel information, firmware version, language and MAC. address. The D-LINK DIR-615/DIR-300 password storage is not hashed and stored in the /var/etc/httppasswd file in plain text, which can lead to the disclosure of sensitive information. The D-LINK DIR-615/DIR-300 change password does not require a current password, allowing an attacker to change the password without having to know the authentication credentials. D-Link DIR-600 and DIR-300 are wireless routers. The following security vulnerabilities exist in D-Link DIR-600 and DIR-300: 1. Multiple command injection vulnerabilities 2. Cross-site request forgery vulnerabilities 3. Cross-site scripting vulnerabilities 4. Encryption algorithm vulnerabilities 5. Multiple information leakage vulnerabilities 6. HTTP header injection vulnerability 7. Security bypass vulnerability. Attackers can use these vulnerabilities to gain access to potentially sensitive information, crack stored passwords, execute arbitrary commands in the context of the affected device, steal cookie-based authentication, perform unauthorized operations in the user's session context, or redirect users Visit any website and execute HTTP request privately, there may be other forms of attacks. Other attacks are also possible
VAR-202001-0859 CVE-2013-3316 Netgear WNR1000v3  Vulnerabilities related to authentication in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Netgear WNR1000v3 with firmware before 1.0.2.60 contains an Authentication Bypass due to the server skipping checks for URLs containing a ".jpg". Netgear WNR1000v3 Contains an authentication vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. The NetGear WNR1000 is a wireless router device. The NetGear WNR1000 device does not properly limit the restrictions on user-submitted URL requests, allowing an attacker to exploit the vulnerability to add \".jpg\" to the URL to bypass restrictions and access arbitrary files, such as configuration files
VAR-202001-0860 CVE-2013-3317 Netgear WNR1000v3  Vulnerabilities related to authentication in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Netgear WNR1000v3 with firmware before 1.0.2.60 contains an Authentication Bypass via the NtgrBak key. Netgear WNR1000v3 Contains an authentication vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. The NetGear WNR1000 is a wireless router device. The NetGear WNR1000 device does not properly limit the restrictions on user-submitted URL requests, allowing an attacker to exploit the vulnerability to add \".jpg\" to the URL to bypass restrictions and access arbitrary files, such as configuration files
VAR-201304-0169 CVE-2013-1214 Cisco Unified Contact Center Express Arbitrary script editor vulnerability in script editor CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The scripts editor in Cisco Unified Contact Center Express (aka Unified CCX) does not properly manage privileges for anonymous logins, which allows remote attackers to read arbitrary scripts by visiting the scripts repository directory, aka Bug ID CSCuf77546. An attacker can exploit this issue to obtain access sensitive information which may aid in further attacks. This issue is tracked by Cisco BugId CSCuf77546. This component integrates agent application and self-service voice service, and provides functions such as call distribution and customer access control
VAR-201304-0172 CVE-2013-1217 Cisco IOS of Generic Input/Output Service disruption in control implementation (DoS) Vulnerabilities CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
The generic input/output control implementation in Cisco IOS does not properly manage buffers, which allows remote authenticated users to cause a denial of service (device reload) by sending many SNMP requests at the same time, aka Bug ID CSCub41105. ( Device reload ) There are vulnerabilities that are put into a state. Cisco IOS is an operation and maintenance system developed by Cisco Systems for its network devices. A common vulnerability exists in the general purpose input/output control mechanism of Cisco IOS devices, allowing authenticated remote attackers to exploit vulnerabilities to overload the Supervisor Engine or device. The vulnerability is due to incorrect buffer handling, which could be triggered by an attacker submitting multiple simultaneous SNMP requests to the affected system. Cisco IOS is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause a reload of the Supervisor Engine or the device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCub41105
VAR-201304-0476 No CVE TP-LINK TL-WR741N/TL-WR741ND Router Denial of Service Vulnerability CVSS V2: 3.3
CVSS V3: -
Severity: LOW
The TP-LINK TL-WR741N/TL-WR741ND incorrectly handles user-submitted requests, allowing remote attackers to exploit the vulnerability to cause the router device's WEB interface to stop responding, causing a denial of service attack. TP-LINK TL-WR741N and TL-WR741ND are wireless routers. Multiple denial of service vulnerabilities exist in the TP-LINK TL-WR741N and TL-WR741ND routers. When processing specially crafted HTTP requests, attackers can use these vulnerabilities to cause the device to crash and deny service to legitimate users
VAR-201304-0560 No CVE Hitachi IT Operations Director Agent Buffer Overflow Vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Hitachi IT Operations Director is a system management software from Hitachi, Japan, which automatically associates tasks with the IT infrastructure lifecycle. A buffer overflow vulnerability exists in Hitachi IT Operations Director. A remote attacker could use this vulnerability to execute arbitrary code with system privileges and could also cause a denial of service. Failed exploit attempts will likely result in a denial-of-service condition
VAR-201311-0097 CVE-2013-3095 D-Link DIR-865L Cross-Site Request Forgery Vulnerability

Related entries in the VARIoT exploits database: VAR-E-201304-0225
CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR865L router (Rev. A1) with firmware before 1.05b07 allow remote attackers to hijack the authentication of administrators for requests that (1) change the administrator password or (2) enable remote management via a request to hedwig.cgi or (3) activate configuration changes via a request to pigwidgeon.cgi. D-Link DIR-865L Router (Rev. The D-Link DIR-865L is an enterprise-class wireless routing device. D-Link DIR-865L has a cross-site request forgery vulnerability that allows remote attackers to exploit vulnerabilities to build malicious URIs, entice users to resolve, and perform malicious operations in the target user context. Such as changing the login password, enabling some services, etc. D-Link DIR-865L is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected device. Other attacks are also possible. D-Link DIR-865L firmware version 1.03 is vulnerable; other versions may also be affected
VAR-201304-0262 CVE-2013-1199 Cisco ASA Clientless running on SSL VPN Service disruption in (DoS) Vulnerabilities CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Race condition in the CIFS implementation in the rewriter module in the Clientless SSL VPN component on Cisco Adaptive Security Appliances (ASA) devices allows remote authenticated users to cause a denial of service (device reload) by accessing resources within multiple sessions, aka Bug ID CSCub58996. An attacker can exploit this issue to reload an affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCub58996
VAR-201304-0288 CVE-2013-1177 Cisco Network Admission Control Manager In SQL Injection vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
SQL injection vulnerability in Cisco Network Admission Control (NAC) Manager before 4.8.3.1 and 4.9.x before 4.9.2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCub23095. Vendors have confirmed this vulnerability Bug ID CSCub23095 It is released as.By any third party SQL The command may be executed. Authentication is not required to exploit this vulnerability.The specific flaw is in the handling of sortColumn URL parameters when constructing SQL database queries. By specially crafting URL parameters, it is possible to influence the SQL queries to gain remote code execution on the affected system. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database and execute arbitrary code. This issue is tracked by Cisco BugID CSCub23095
VAR-201304-0287 CVE-2013-1176 Multiple Cisco TelePresence Product denial of service vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448. Vendors have confirmed this vulnerability Bug ID CSCuc11328 ,and CSCub05448 It is released as.By a third party (1) SIP Session, or (2) H.323 Cleverly crafted in session RTP Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco TelePresence is a set of video conferencing solutions called "Telepresence" systems from Cisco (USA). This solution provides components such as audio and video space, which can provide remote participants with a "face-to-face" virtual conference room effect. A denial of service vulnerability exists in several Cisco TelePresence products. An attacker could use this vulnerability to reload the device and deny legitimate users. The vulnerability exists in the following products: Cisco TelePresence MCU, Cisco TelePresence Server. The vulnerability originates from the program H.264 data is not properly validated
VAR-201304-0257 CVE-2013-1194 Cisco ASA Device ISAKMP Enumerated group vulnerability in the implementation of CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The ISAKMP implementation on Cisco Adaptive Security Appliances (ASA) devices generates different responses for IKE aggressive-mode messages depending on whether invalid VPN groups are specified, which allows remote attackers to enumerate groups via a series of messages, aka Bug ID CSCue73708. Vendors have confirmed this vulnerability Bug ID CSCue73708 It is released as.A third party may enumerate groups through a series of messages. Cisco Adaptive Security Appliance is prone to an information-disclosure vulnerability. An attacker can exploit this issue to obtain remote access VPN groups configured in a Cisco ASA device; information obtained may aid in further attacks. This issue is tracked by Cisco BugId CSCue73708
VAR-201404-0101 CVE-2013-3069 Netgear WNDR4700 Cross-Site Scripting Vulnerability

Related entries in the VARIoT exploits database: VAR-E-201304-0008
CVSS V2: 3.5
CVSS V3: -
Severity: LOW
Multiple cross-site scripting (XSS) vulnerabilities in NETGEAR WNDR4700 with firmware 1.0.0.34 allow remote authenticated users to inject arbitrary web script or HTML via the (1) UserName or (2) Password to the NAS User Setup page, (3) deviceName to USB_advanced.htm, or (4) Network Key to the Wireless Setup page. The NetgearWNDR4700 is a wireless router device. The NetgearWNDR4700 has a remote cross-site scripting attack that allows remote attackers to exploit exploits to build specially crafted URIs that trick users into parsing, gaining sensitive information or hijacking user sessions. NetGear WNDR4700 is prone to an unspecified cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected device. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. NetGear WNDR4700 running firmware 1.0.0.34 is vulnerable
VAR-202002-0513 CVE-2013-2646 TP-LINK TL-WR1043ND Vulnerabilities in devices CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
TP-LINK TL-WR1043ND V1_120405 devices contain an unspecified denial of service vulnerability. The TP-LINK TL-WR1043ND is a wireless router device. The TP-LINK TL-WR1043ND router has an unexplained defect that allows remote attackers to exploit the vulnerability to perform a denial of service attack on the device. Little is known about this issue or its effects at this time. We will update this BID as more information emerges. A remote attacker can exploit this issue to cause denial-of-service conditions
VAR-201911-1480 CVE-2013-3073 NETGEAR Centria WNDR4700 Path traversal vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A Symlink Traversal vulnerability exists in NETGEAR Centria WNDR4700 Firmware 1.0.0.34. NETGEAR Centria WNDR4700 The firmware contains a path traversal vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The NetgearWNDR4700 is a wireless router device. The NetgearWNDR4700 has a limited path traversal problem. Because the application does not properly filter the user-submitted input, a directory traversal attack (such as ../../) can be performed in SMB via symbolic links. NetGear WNDR4700 is prone to a directory-traversal vulnerability because the application fails to sufficiently sanitize user-supplied input. Exploits would allow an attacker to access files outside of the restricted directory to obtain sensitive information and perform other attacks
VAR-201911-1482 CVE-2013-3070 Netgear WNDR4700 Vulnerability related to information disclosure in running firmware CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An Information Disclosure vulnerability exists in Netgear WNDR4700 running firmware 1.0.0.34 in the management web interface, which discloses the PSK of the wireless LAN. The Netgear WNDR4700 is a wireless router device. The NetgearWNDR4700 has an unspecified security vulnerability that allows an attacker to exploit a vulnerability to obtain sensitive information. There are no detailed vulnerability details available. NetGear WNDR4700 is prone to an unspecified information-disclosure vulnerability
VAR-201911-1483 CVE-2013-3072 NETGEAR Centria WNDR4700 Firmware authentication vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An Authentication Bypass vulnerability exists in NETGEAR Centria WNDR4700 Firmware 1.0.0.34 in http://<router_ip>/apply.cgi?/hdd_usr_setup.htm that when visited by any user, authenticated or not, causes the router to no longer require a password to access the web administration portal. NETGEAR Centria WNDR4700 There are authentication vulnerabilities in the firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The NetgearWNDR4700 is a wireless router device. The NetgearWNDR4700 has an unidentified vulnerability that allows unauthenticated attackers to exploit the vulnerability to connect any hardware to the device. No detailed vulnerability details are currently available. Netgear WNDR4700 routers are prone to a remote authentication-bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism and gain unauthorized access. NetGear WNDR4700 routers running firmware 1.0.0.34 are vulnerable