VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202201-1947 CVE-2022-23017 plural  F5 Networks  In the product  NULL  Pointer dereference vulnerability CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
On BIG-IP version 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and all versions of 13.1.x, when a virtual server is configured with a DNS profile with the Rapid Response Mode setting enabled and is configured on a BIG-IP system, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a code problem vulnerability in F5 BIG-IP, which can be exploited by attackers to cause a denial of service
VAR-202201-1949 CVE-2022-23025 BIG-IP  In  NULL  Pointer dereference vulnerability CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
On BIG-IP version 16.1.x before 16.1.1, 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, and all versions of 13.1.x, when a SIP ALG profile is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP has a code issue vulnerability that can be exploited by an attacker to cause a denial of service on the BIG-IP system
VAR-202201-1344 CVE-2022-23014 BIG-IP APM  Input validation vulnerability in portal CVSS V2: 6.8
CVSS V3: 6.5
Severity: MEDIUM
On versions 16.1.x before 16.1.2 and 15.1.x before 15.1.4.1, when BIG-IP APM portal access is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP APM Portal contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates network traffic orchestration, load balancing, intelligent DNS, remote access policy management and other functions. The F5 BIG-IP APM input validation error vulnerability could be exploited by an attacker to cause a denial of service
VAR-202201-1950 CVE-2022-23021 plural  F5 Networks  In the product  NULL  Pointer dereference vulnerability CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
On BIG-IP version 16.1.x before 16.1.2, when any of the following configurations are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate: HTTP redirect rule in an LTM policy, BIG-IP APM Access Profile, and Explicit HTTP Proxy in HTTP Profile. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP has a code issue vulnerability that can be exploited by an attacker to cause a denial of service on the BIG-IP system
VAR-202201-1319 CVE-2022-23010 plural  F5 Networks  Product Improper Shutdown and Release of Resources Vulnerability CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
On BIG-IP versions 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, and all versions of 13.1.x, 12.1.x, and 11.6.x, when a FastL4 profile and an HTTP profile are configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks A resource improper shutdown and release vulnerability exists in the product.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5
VAR-202201-1311 CVE-2021-40042 plural  Huawei  Invalid Pointer and Free Reference Vulnerabilities in Products CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
There is a release of invalid pointer vulnerability in some Huawei products, successful exploit may cause the process and service abnormal. Affected product versions include: CloudEngine 12800 V200R019C10SPC800, V200R019C10SPC900; CloudEngine 5800 V200R019C10SPC800, V200R020C00SPC600; CloudEngine 6800 versions V200R019C10SPC800, V200R019C10SPC900, V200R020C00SPC600, V300R020C00SPC200; CloudEngine 7800 V200R019C10SPC800. plural Huawei The product contains an invalid pointer and reference freeing vulnerability.Service operation interruption (DoS) It may be in a state. Huawei CloudEngine 12800, etc. are all products of China's Huawei (Huawei). Huawei CloudEngine 12800 is a 12800 series data center switch. Huawei Cloudengine 5800 is a 5800 series data center switch. A buffer overflow vulnerability exists in many Huawei products. The vulnerability is caused by insufficient validation of certain parameters in the message
VAR-202201-1964 CVE-2022-23029 plural  F5 Networks  In the product  Time-of-check Time-of-use (TOCTOU)  Race condition vulnerabilities CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
On BIG-IP version 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, and all versions of 13.1.x, 12.1.x, and 11.6.x, when a FastL4 profile is configured on a virtual server, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product has Time-of-check Time-of-use (TOCTOU) There is a race condition vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A configuration file vulnerability exists in F5 BIG-IP FastL4 that could be exploited by an unauthenticated remote attacker to cause service degradation, resulting in a denial of service (DoS) on the BIG-IP system
VAR-202201-1369 CVE-2021-36348 iDRAC9  Injection vulnerability in CVSS V2: 5.5
CVSS V3: 8.1
Severity: HIGH
iDRAC9 versions prior to 5.00.20.00 contain an input injection vulnerability. A remote authenticated malicious user with low privileges may potentially exploit this vulnerability to cause information disclosure or denial of service by supplying specially crafted input data to iDRAC. iDRAC9 There is an injection vulnerability in.Information is obtained and service operation is interrupted (DoS) It may be in a state. Dell Emc Idrac is a kind of hardware located on the server motherboard from Dell (Dell). For system administrators to update and manage Dell systems. Dell EMC iDRAC has a security vulnerability that could allow an unauthenticated remote attacker to deny access to the iDRAC web server
VAR-202201-1962 CVE-2022-23018 BIG-IP AFM  Vulnerability in handling exceptional conditions in CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
On BIG-IP AFM version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and 13.1.x beginning in 13.1.3.4, when a virtual server is configured with both HTTP protocol security and HTTP Proxy Connect profiles, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP AFM Exists in a vulnerability in handling exceptional conditions.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a security vulnerability in F5 BIG-IP, which can be exploited by attackers to cause a denial of service
VAR-202201-1960 CVE-2022-23020 plural  F5 Networks  In the product  NULL  Pointer dereference vulnerability CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
On BIG-IP version 16.1.x before 16.1.2, when the 'Respond on Error' setting is enabled on the Request Logging profile and configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a code problem vulnerability in F5 BIG-IP, which can be exploited by attackers to cause a denial of service
VAR-202201-1346 CVE-2022-23019 plural  BIG-IP  Product input verification vulnerabilities CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
On BIG-IP version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, and all versions of 13.1.x and 12.1.x, when a message routing type virtual server is configured with both Diameter Session and Router Profiles, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural BIG-IP The product contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP has an input validation error vulnerability, which can be exploited by attackers to cause a denial of service
VAR-202201-1959 CVE-2022-23031 plural  F5 Networks  In the product  XML  External entity vulnerabilities CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
On BIG-IP FPS, ASM, and Advanced WAF versions 16.1.x before 16.1.1, 15.1.x before 15.1.4, and 14.1.x before 14.1.4.4, an XML External Entity (XXE) vulnerability exists in an undisclosed page of the F5 Advanced Web Application Firewall (Advanced WAF) and BIG-IP ASM Traffic Management User Interface (TMUI), also referred to as the Configuration utility, that allows an authenticated high-privileged attacker to read local files and force BIG-IP to send HTTP requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP FPS , ASM , Advanced WAF for, XML There is a vulnerability in an external entity.Information may be obtained. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management
VAR-202201-1961 CVE-2022-23013 BIG-IP DNS  and  GTM  Cross-site scripting vulnerability in CVSS V2: 4.3
CVSS V3: 8.8
Severity: HIGH
On BIG-IP DNS & GTM version 16.x before 16.1.0, 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, and all versions of 13.1.x, 12.1.x, and 11.6.x, a DOM-based cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP DNS and GTM Exists in a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management
VAR-202201-1948 CVE-2022-23026 BIG-IP ASM  and  Advanced WAF  Vulnerability in unlimited upload of dangerous types of files in CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
On BIG-IP ASM & Advanced WAF version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and all versions of 13.1.x and 12.1.x, an authenticated user with low privileges, such as a guest, can upload data using an undisclosed REST endpoint causing an increase in disk resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP ASM and Advanced WAF Contains a vulnerability related to unlimited uploads of dangerous types of files.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a code problem vulnerability in F5 BIG-IP, which can be exploited by attackers to increase disk utilization and cause denial of service
VAR-202201-1345 CVE-2022-23028 BIG-IP AFM  calculation error vulnerability in CVSS V2: 4.3
CVSS V3: 5.3
Severity: MEDIUM
On BIG-IP AFM version 16.x before 16.1.0, 15.1.x before 15.1.5, 14.1.x before 14.1.4.5, and all versions of 13.1.x, when global AFM SYN cookie protection (TCP Half Open flood vector) is activated in the AFM Device Dos or DOS profile, certain types of TCP connections will fail. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP AFM contains a computational error vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP AFM has a security vulnerability that could be exploited by an attacker to cause a denial of service on the BIG-IP system
VAR-202201-1368 CVE-2021-36346 Dell iDRAC8  Vulnerability in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Dell iDRAC 8 prior to version 2.82.82.82 contain a denial of service vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability to deny access to the iDRAC webserver. Dell iDRAC8 Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Dell EMC iDRAC is a kind of hardware located on the server motherboard from Dell (Dell). For system administrators to update and manage Dell systems. A denial-of-service vulnerability in Dell EMC iDRAC stems from improper handling of input error messages, which could be exploited by a remote, high-privileged attacker to control process execution and gain access to the iDRAC operating system
VAR-202201-1371 CVE-2022-23016 plural  F5 Networks  In the product  NULL  Pointer dereference vulnerability CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
On versions 16.1.x before 16.1.2 and 15.1.x before 15.1.4.1, when BIG-IP SSL Forward Proxy with TLS 1.3 is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a code problem vulnerability in F5 BIG-IP, which can be exploited by attackers to cause a denial of service
VAR-202201-1944 CVE-2022-23024 BIG-IP AFM  Resource exhaustion vulnerability in CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
On BIG-IP AFM version 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.2, and all versions of 13.1.x, when the IPsec application layer gateway (ALG) logging profile is configured on an IPsec ALG virtual server, undisclosed IPsec traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP AFM Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. The F5 BIG-IP AFM has a resource management error vulnerability that could be exploited by an attacker to cause a denial of service on the BIG-IP system
VAR-202201-1941 CVE-2021-42810 SafeNet Agent for Remote Desktop Gateway  In  PRNG  Improper Use of Seeds Vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A flaw in the previous versions of the product may allow an authenticated attacker the ability to execute code as a privileged user on a system where the agent is installed. SafeNet Agent for Remote Desktop Gateway for, PRNG A vulnerability exists related to improper use of seeds in .Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Thales Group Thales Sentinel Protection Installer is an integrated installer of the French company Thales Group
VAR-202201-1374 CVE-2022-23023 plural  F5 Networks  Product resource exhaustion vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
On BIG-IP version 16.1.x before 16.1.2.1, 15.1.x before 15.1.5, 14.1.x before 14.1.4.5, and all versions of 13.1.x and 12.1.x, and BIG-IQ all versions of 8.x and 7.x, undisclosed requests by an authenticated iControl REST user can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product contains a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A resource management error vulnerability exists in F5 BIG-IP that could be exploited by an authenticated remote attacker to cause service degradation, resulting in a denial of service on the BIG-IP system