VARIoT IoT vulnerabilities database
| VAR-202111-0649 | CVE-2021-41426 | Beeline Smart Box Cross-site request forgery vulnerability in |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Beeline Smart box 2.0.38 is vulnerable to Cross Site Request Forgery (CSRF) via mgt_end_user.htm. (DoS) It may be in a state
| VAR-202111-1051 | CVE-2021-33086 | plural Intel(R) NUC Out-of-bounds write vulnerabilities in the product |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: MEDIUM |
Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access. plural Intel(R) NUC The product contains a vulnerability related to out-of-bounds writes.Service operation interruption (DoS) It may be in a state
| VAR-202111-0648 | CVE-2021-41427 | Beeline Smart Box Cross-site scripting vulnerability in |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Beeline Smart Box 2.0.38 is vulnerable to Cross Site Scripting (XSS) via the choose_mac parameter to setup.cgi
| VAR-202112-0297 | CVE-2021-22955 | Citrix ADC Resource exhaustion vulnerability in |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
A unauthenticated denial of service vulnerability exists in Citrix ADC <13.0-83.27, <12.1-63.22 and 11.1-65.23 when configured as a VPN (Gateway) or AAA virtual server could allow an attacker to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication. Citrix ADC Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202112-0296 | CVE-2021-22956 | Citrix ADC Resource exhaustion vulnerability in |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
An uncontrolled resource consumption vulnerability exists in Citrix ADC <13.0-83.27, <12.1-63.22 and 11.1-65.23 that could allow an attacker with access to NSIP or SNIP with management interface access to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication. Citrix ADC Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202111-0723 | CVE-2020-28137 | Genexis Platinum 4410 Cross-site request forgery vulnerability in |
CVSS V2: 7.1 CVSS V3: 6.5 Severity: MEDIUM |
Cross site request forgery (CSRF) in Genexis Platinum 4410 V2-1.28, allows attackers to cause a denial of service by continuously restarting the router. Genexis Platinum 4410 Contains a cross-site request forgery vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202111-1839 | CVE-2021-36318 | Dell EMC Avamar Vulnerability regarding insufficient protection of authentication information in |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Dell EMC Avamar versions 18.2,19.1,19.2,19.3,19.4 contain a plain-text password storage vulnerability. A high privileged user could potentially exploit this vulnerability, leading to a complete outage. Dell EMC Avamar There are vulnerabilities in inadequate protection of credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202210-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Rust: Multiple Vulnerabilities
Date: October 16, 2022
Bugs: #870166, #831638, #821157, #807052, #782367
ID: 202210-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Multiple vulnerabilities have been discovered in Rust, the worst of
which could result in denial of service.
Background
=========
A systems programming language that runs blazingly fast, prevents
segfaults, and guarantees thread safety.
Affected packages
================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-lang/rust < 1.63.0-r1 >= 1.63.0-r1
2 dev-lang/rust-bin < 1.64.0 >= 1.64.0
Description
==========
Multiple vulnerabilities have been discovered in Rust. Please review the
CVE identifiers referenced below for details.
Impact
=====
Please review the referenced CVE identifiers for details.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All Rust users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">\xdev-lang/rust-1.63.0-r1"
All Rust binary users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">\xdev-lang/rust-bin-1.64.0"
In addition, users using Portage 3.0.38 or later should ensure that
packages with Rust binaries have no vulnerable code statically linked
into their binaries by rebuilding the @rust-rebuild set:
# emerge --ask --oneshot --verbose @rust-rebuild
References
=========
[ 1 ] CVE-2021-28875
https://nvd.nist.gov/vuln/detail/CVE-2021-28875
[ 2 ] CVE-2021-28876
https://nvd.nist.gov/vuln/detail/CVE-2021-28876
[ 3 ] CVE-2021-28877
https://nvd.nist.gov/vuln/detail/CVE-2021-28877
[ 4 ] CVE-2021-28878
https://nvd.nist.gov/vuln/detail/CVE-2021-28878
[ 5 ] CVE-2021-28879
https://nvd.nist.gov/vuln/detail/CVE-2021-28879
[ 6 ] CVE-2021-29922
https://nvd.nist.gov/vuln/detail/CVE-2021-29922
[ 7 ] CVE-2021-31162
https://nvd.nist.gov/vuln/detail/CVE-2021-31162
[ 8 ] CVE-2021-36317
https://nvd.nist.gov/vuln/detail/CVE-2021-36317
[ 9 ] CVE-2021-36318
https://nvd.nist.gov/vuln/detail/CVE-2021-36318
[ 10 ] CVE-2021-42574
https://nvd.nist.gov/vuln/detail/CVE-2021-42574
[ 11 ] CVE-2021-42694
https://nvd.nist.gov/vuln/detail/CVE-2021-42694
[ 12 ] CVE-2022-21658
https://nvd.nist.gov/vuln/detail/CVE-2022-21658
[ 13 ] CVE-2022-36113
https://nvd.nist.gov/vuln/detail/CVE-2022-36113
[ 14 ] CVE-2022-36114
https://nvd.nist.gov/vuln/detail/CVE-2022-36114
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202210-09
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2022 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
| VAR-202111-1838 | CVE-2021-36317 | Dell EMC Avamar Server Vulnerability regarding insufficient protection of authentication information in |
CVSS V2: 2.1 CVSS V3: 6.7 Severity: MEDIUM |
Dell EMC Avamar Server version 19.4 contains a plain-text password storage vulnerability in AvInstaller. A local attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account. Dell EMC Avamar Server There are vulnerabilities in inadequate protection of credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202210-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Rust: Multiple Vulnerabilities
Date: October 16, 2022
Bugs: #870166, #831638, #821157, #807052, #782367
ID: 202210-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Multiple vulnerabilities have been discovered in Rust, the worst of
which could result in denial of service.
Background
=========
A systems programming language that runs blazingly fast, prevents
segfaults, and guarantees thread safety.
Affected packages
================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-lang/rust < 1.63.0-r1 >= 1.63.0-r1
2 dev-lang/rust-bin < 1.64.0 >= 1.64.0
Description
==========
Multiple vulnerabilities have been discovered in Rust. Please review the
CVE identifiers referenced below for details.
Impact
=====
Please review the referenced CVE identifiers for details.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All Rust users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">\xdev-lang/rust-1.63.0-r1"
All Rust binary users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">\xdev-lang/rust-bin-1.64.0"
In addition, users using Portage 3.0.38 or later should ensure that
packages with Rust binaries have no vulnerable code statically linked
into their binaries by rebuilding the @rust-rebuild set:
# emerge --ask --oneshot --verbose @rust-rebuild
References
=========
[ 1 ] CVE-2021-28875
https://nvd.nist.gov/vuln/detail/CVE-2021-28875
[ 2 ] CVE-2021-28876
https://nvd.nist.gov/vuln/detail/CVE-2021-28876
[ 3 ] CVE-2021-28877
https://nvd.nist.gov/vuln/detail/CVE-2021-28877
[ 4 ] CVE-2021-28878
https://nvd.nist.gov/vuln/detail/CVE-2021-28878
[ 5 ] CVE-2021-28879
https://nvd.nist.gov/vuln/detail/CVE-2021-28879
[ 6 ] CVE-2021-29922
https://nvd.nist.gov/vuln/detail/CVE-2021-29922
[ 7 ] CVE-2021-31162
https://nvd.nist.gov/vuln/detail/CVE-2021-31162
[ 8 ] CVE-2021-36317
https://nvd.nist.gov/vuln/detail/CVE-2021-36317
[ 9 ] CVE-2021-36318
https://nvd.nist.gov/vuln/detail/CVE-2021-36318
[ 10 ] CVE-2021-42574
https://nvd.nist.gov/vuln/detail/CVE-2021-42574
[ 11 ] CVE-2021-42694
https://nvd.nist.gov/vuln/detail/CVE-2021-42694
[ 12 ] CVE-2022-21658
https://nvd.nist.gov/vuln/detail/CVE-2022-21658
[ 13 ] CVE-2022-36113
https://nvd.nist.gov/vuln/detail/CVE-2022-36113
[ 14 ] CVE-2022-36114
https://nvd.nist.gov/vuln/detail/CVE-2022-36114
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202210-09
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2022 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
| VAR-202111-1837 | CVE-2021-36316 | Dell EMC Avamar Server Vulnerability in privilege management in |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
Dell EMC Avamar Server versions 18.2, 19.1, 19.2, 19.3, and 19.4 contain an improper privilege management vulnerability in AUI. A malicious user with high privileges could potentially exploit this vulnerability, leading to the disclosure of the AUI info and performing some unauthorized operation on the AUI. (DoS) It may be in a state
| VAR-202111-1619 | CVE-2021-33058 | Windows for Intel(R) Administrative Tools for Intel(R) Network Adapters Vulnerability in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper access control in the installer Intel(R)Administrative Tools for Intel(R) Network Adaptersfor Windowsbefore version 1.4.0.21 may allow an unauthenticated user to potentially enable escalation of privilege via local access. Windows for Intel(R) Administrative Tools for Intel(R) Network Adapters Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Intel Ethernet Controllers is an Ethernet controller of Intel Corporation of the United States
| VAR-202111-1618 | CVE-2021-33059 | Windows for Intel(R) Administrative Tools for Intel(R) Network Adapters Driver input verification vulnerability |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Improper input validation in the Intel(R) Administrative Tools for Intel(R) Network Adapters driver for Windows before version 1.4.0.15, may allow a privileged user to potentially enable escalation of privilege via local access. (DoS) It may be in a state. Intel Ethernet Adapters 800 is an Ethernet adapter produced by Intel Corporation of the United States
| VAR-202111-1314 | CVE-2021-33118 | Intel(R) Serial IO driver for Intel(R) NUC 11 Gen Vulnerability in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper access control in the software installer for the Intel(R) Serial IO driver for Intel(R) NUC 11 Gen before version 30.100.2104.1 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) Serial IO driver for Intel(R) NUC 11 Gen Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-1205 | CVE-2021-33062 | Intel(R) VTune(TM) Profiler Vulnerability regarding improper default permissions in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Incorrect default permissions in the software installer for the Intel(R) VTune(TM) Profiler before version 2021.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) VTune(TM) Profiler There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Intel VTune Profiler is a performance testing tool used by Intel Corporation to optimize software. The software can perform performance tests on embedded applications of the Internet of Things, media software, Java applications, and high-performance computing applications.
Intel VTune Profiler has a security vulnerability that allows local users to upgrade privileges on the system
| VAR-202111-1204 | CVE-2021-33071 | Intel(R) oneAPI Rendering Toolkit Vulnerability regarding improper default permissions in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Incorrect default permissions in the installer for the Intel(R) oneAPI Rendering Toolkit before version 2021.2 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) oneAPI Rendering Toolkit There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-1203 | CVE-2021-33073 | Intel(R) Distribution of OpenVINO Toolkit Resource exhaustion vulnerability in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Uncontrolled resource consumption in the Intel(R) Distribution of OpenVINOâ„¢ Toolkit before version 2021.4 may allow an unauthenticated user to potentially enable denial of service via local access. Intel(R) Distribution of OpenVINO Toolkit Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. Intel Distribution of OpenVINO(TM) Toolkit is an application and solution developed by Intel Corporation of the United States that uses deep learning intelligence. Based on convolutional neural networks (CNNs), the toolkit scales workloads across Intel® hardware, including accelerators, and maximizes performance
| VAR-202111-1193 | CVE-2021-0158 | plural Intel(R) Processor Input verification vulnerability in |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. plural Intel(R) Processor There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Intel Xeon Scalable Processors are all products of Intel Corporation of the United States. Intel Xeon Scalable Processors are a scalable server central processing unit (CPU). Intel Core X-series Processors are an X-series central processing unit (CPU). Intel Xeon Processor E3 v6 Family is a central processing unit (CPU) product
| VAR-202111-1191 | CVE-2021-33097 | Crypto API Toolkit for Intel(R) SGX In Time-of-check Time-of-use (TOCTOU) Race condition vulnerabilities |
CVSS V2: 6.0 CVSS V3: 6.6 Severity: MEDIUM |
Time-of-check time-of-use vulnerability in the Crypto API Toolkit for Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via network access. (DoS) It may be in a state. Intel Crypto Api Toolkit is an encryption Api toolkit of Intel Corporation. Interfaces for securely running key generation and cryptographic operations to enhance the security of data and key protection applications. Intel is releasing software updates to mitigate this potential vulnerability
| VAR-202111-1151 | CVE-2021-0157 | plural Intel(R) Processor Vulnerability in |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. plural Intel(R) Processor Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Intel Xeon Scalable Processors are all products of Intel Corporation of the United States. Intel Xeon Scalable Processors are a scalable server central processing unit (CPU). Intel Core X-series Processors are an X-series central processing unit (CPU). Intel Xeon Processor E3 v6 Family is a central processing unit (CPU) product
| VAR-202111-1148 | CVE-2021-0135 | Windows for Intel(R) Ethernet Diagnostic Driver input verification vulnerability |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access. (DoS) It may be in a state. Intel Ethernet Diagnostic is a network adapter management tool of Intel Corporation
| VAR-202111-1088 | CVE-2020-8741 | Intel(R) Thunderbolt(TM) non-DCH Improper default permissions vulnerability in driver |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper permissions in the installer for the Intel(R) Thunderbolt(TM) non-DCH driver, all versions, for Windows may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) Thunderbolt(TM) non-DCH Driver contains improper default permissions vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state