VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202112-0424 CVE-2021-20045 plural  SonicWALL  Appliance Classic Buffer Overflow Vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A buffer overflow vulnerability in SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method allows a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances. plural SonicWALL Appliances contain a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202112-0732 CVE-2021-20040 plural  SonicWALL  Path Traversal Vulnerability in Appliances CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A relative path traversal vulnerability in the SMA100 upload funtion allows a remote unauthenticated attacker to upload crafted web pages or files as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances. plural SonicWALL Appliance contains a path traversal vulnerability.Information may be tampered with
VAR-202112-0731 CVE-2021-20041 plural  SonicWALL  Infinite loop vulnerability in appliances CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
An unauthenticated and remote adversary can consume all of the device's CPU due to crafted HTTP requests sent to SMA100 /fileshare/sonicfiles/sonicfiles resulting in a loop with unreachable exit condition. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances. plural SonicWALL Appliances contain an infinite loop vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202112-0426 CVE-2021-20043 plural  SonicWALL  Appliance out-of-bounds write vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
A Heap-based buffer overflow vulnerability in SonicWall SMA100 getBookmarks method allows a remote authenticated attacker to potentially execute code as the nobody user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances. plural SonicWALL Appliances contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202112-0425 CVE-2021-20044 plural  SonicWALL  in the appliance  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances. (DoS) It may be in a state
VAR-202112-0389 CVE-2021-20039 plural  SonicWALL  in the appliance  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Improper neutralization of special elements in the SMA100 management interface '/cgi-bin/viewcert' POST http method allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances. plural SonicWALL The appliance has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202112-0361 CVE-2021-20038 plural  SonicWALL  Appliance out-of-bounds write vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions. plural SonicWALL Appliances contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202112-1045 CVE-2021-41028 FortiClientEMS  and  FortiClient  Certificate validation vulnerabilities in CVSS V2: 5.4
CVSS V3: 7.5
Severity: HIGH
A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol. FortiClientEMS and FortiClient contains a certificate validation vulnerability and a vulnerability related to the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiClient is a mobile terminal security solution developed by Fortinet. The solution provides IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication when connected to FortiGate firewall appliances. Fortinet FortiClient has a security vulnerability that could be exploited by an attacker to act as a man-in-the-middle on FortiClient via the telemetry protocol in order to read or write data within the session
VAR-202112-1044 CVE-2021-44168 FortiOS  Vulnerability regarding incomplete integrity verification of downloaded code in CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3 may allow a local authenticated attacker to download arbitrary files on the device via specially crafted update packages. FortiOS Contains a vulnerability in the integrity verification flaw of the downloaded code.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiOS is a set of security operating system dedicated to the FortiGate network security platform developed by Fortinet. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSLVPN, Web content filtering and anti-spam. There is a security vulnerability in Fortinet FortiOS, an attacker can use this vulnerability to bypass FortiOS restrictions through Execute Restore Src-vis to escalate his privileges
VAR-202112-0526 CVE-2021-36167 FortiClient  Vulnerability in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
An improper authorization vulnerabiltiy [CWE-285] in FortiClient Windows versions 7.0.0 and 6.4.6 and below and 6.2.8 and below may allow an unauthenticated attacker to bypass the webfilter control via modifying the session-id paramater. FortiClient Exists in unspecified vulnerabilities.Information may be tampered with
VAR-202112-0399 CVE-2021-43204 FortiClientWindows  Vulnerability in CVSS V2: 4.9
CVSS V3: 4.4
Severity: MEDIUM
A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions. FortiClientWindows Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
VAR-202112-0385 CVE-2021-42717 ModSecurity  Recursion control vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafted JSON objects with nesting tens-of-thousands deep could result in the web server being unable to service legitimate requests. Even a moderately large (e.g., 300KB) HTTP request can occupy one of the limited NGINX worker processes for minutes and consume almost all of the available CPU on the machine. Modsecurity 2 is similarly vulnerable: the affected versions include 2.8.0 through 2.9.4. ModSecurity Exists in a recursive control vulnerability.Service operation interruption (DoS) It may be in a state. ModSecurity is an intrusion detection and prevention engine that can run as a module of the Apache web server or as a separate application to enhance the security of web applications and protect web applications from known and unknown attacks. The update introduces a new 'SecRequestBodyJsonDepthLimit' option to limit the maximum request body JSON parsing depth which ModSecurity will accept (defaults to 10000). For the oldstable distribution (buster), this problem has been fixed in version 2.9.3-1+deb10u1. For the stable distribution (bullseye), this problem has been fixed in version 2.9.3-3+deb11u1. We recommend that you upgrade your modsecurity-apache packages. For the detailed security status of modsecurity-apache please refer to its security tracker page at: https://security-tracker.debian.org/tracker/modsecurity-apache Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmG93fFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0TISQ/9FDNX/GMbzanT4mYbAIXAbQ8tHGJhJVifHwnM8VcUv5xCecJDsHs5rg65 XSgAw7kyG17TotGrU+m8rhqbNrwcCnPAI5YqcxSKASim1Seu7Teayle+bDDTraHQ oTpNGaZ1aTaKtsQ3+TpHmsOoMcBivGX+ay7GldRO3krebAVAZEx8Y824tt/2jer5 XEM5XXkQA8fjRyr8K/JpdxivGCRL20KKg3dOLrUrw6UP8l/avd66ORGxCWRQ4abN RoCu2NkZul558kYa7q95DJy1Hwa0OHygq+wjeQnojJMsup/WD+YcRclbEJsEVG/s DEr3mYvekgtn0UlaRJWJNtknqUNHg67rts3wwlmXOLsLg1Darjm5HiowUMy8cki0 jvST+Zb5UdGO02Fj5xch/lP1VABpcra19+XGs1yNrAXhiE7FUZMCXlZqRgRKWx5O ueKIP7PAEp9TIaOA+H33y9y3EAWnM2l3BbstBV28d8rBecIHzRnkd4HQ2XgTh1Sd rM4a5KmADtWAdya4aRev1Qyr3qBEEU8q4A1TRMRLvBHosIETr6P0//+0dua97oE/ C8+sHm+CLo6scuD65Xpuyjv/zHPuxXSXN/Fkp6qgxhcH7MGwRbXx8JwsAWmGfWSL pjAcO7UMz0dLCR8hxpzsGLgjKQVC/STyh+ufHK5oEid41Z4PW60= =9Flq -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-6370-1 September 14, 2023 modsecurity-apache vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS (Available with Ubuntu Pro) - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) - Ubuntu 14.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in ModSecurity. Software Description: - modsecurity-apache: Tighten web applications security for Apache Details: It was discovered that ModSecurity incorrectly handled certain nested JSON objects. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-42717) It was discovered that ModSecurity incorrectly handled certain HTTP multipart requests. A remote attacker could possibly use this issue to bypass ModSecurity restrictions. (CVE-2022-48279) It was discovered that ModSecurity incorrectly handled certain file uploads. A remote attacker could possibly use this issue to cause a buffer overflow and a firewall failure. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-24021) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS (Available with Ubuntu Pro): libapache2-mod-security2 2.9.5-1ubuntu0.1~esm1 Ubuntu 20.04 LTS: libapache2-mod-security2 2.9.3-1ubuntu0.1 Ubuntu 18.04 LTS (Available with Ubuntu Pro): libapache2-mod-security2 2.9.2-1ubuntu0.1~esm1 Ubuntu 16.04 LTS (Available with Ubuntu Pro): libapache2-mod-security2 2.9.0-1ubuntu0.1~esm1 libapache2-modsecurity 2.9.0-1ubuntu0.1~esm1 Ubuntu 14.04 LTS (Available with Ubuntu Pro): libapache2-mod-security2 2.7.7-2ubuntu0.1~esm1 libapache2-modsecurity 2.7.7-2ubuntu0.1~esm1 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6370-1 CVE-2021-42717, CVE-2022-48279, CVE-2023-24021 Package Information: https://launchpad.net/ubuntu/+source/modsecurity-apache/2.9.3-1ubuntu0.1
VAR-202112-0338 CVE-2021-42757 FortiOS  of  TFTP  client library and  FortiOS  Classic buffer overflow vulnerability in CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments. (DoS) It may be in a state
VAR-202112-0336 CVE-2021-37056 Huawei  Vulnerability related to improper retention of permissions in smartphone products CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
There is an Improper permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information. Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Information may be obtained
VAR-202112-0138 CVE-2021-37038 Huawei  Vulnerabilities in smartphone products CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There is an Improper access control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android
VAR-202112-0137 CVE-2021-37041 Huawei  Input validation vulnerability in smartphone products CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202112-0136 CVE-2021-37042 Huawei  Input validation vulnerability in smartphone products CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202112-0133 CVE-2021-37055 Huawei  Vulnerabilities in smartphone products CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
There is a Logic bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained
VAR-202112-0246 CVE-2021-37068 Huawei  Vulnerabilities in smartphones CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There is a Resource Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of Service Attacks. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
VAR-202112-0135 CVE-2021-37046 Huawei  Vulnerability related to lack of memory release after expiration in smartphone products CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
There is a Memory leak vulnerability with the codec detection module in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart due to memory exhaustion. Huawei A vulnerability related to lack of freeing memory after expiration exists in smartphone products.Service operation interruption (DoS) It may be in a state