VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202109-0070 CVE-2020-18684 Floodlight integer overflow vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Floodlight through 1.2 has an integer overflow in checkFlow in StaticFlowEntryPusherResource.java via priority or port number. Floodlight is an open source OpenFlow controller. No detailed vulnerability details are currently provided
VAR-202110-0264 CVE-2021-33626 InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count SMM Privilege Escalation 10 SMM Memory Corruption 12 DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. InsydeH2O Includes a vulnerability in incorporating functionality from an untrusted control area.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 up to and including 5.5)
VAR-202109-0160 CVE-2020-20746 Tenda AC9 Buffer Overflow Vulnerability (CNVD-2022-26248) CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
A stack-based buffer overflow in the httpd server on Tenda AC9 V15.03.06.60_EN allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via a crafted POST request to /goform/SetStaticRouteCfg. Tenda AC9 is a router device
VAR-202109-1208 CVE-2021-41101 wire-server  Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 5.7
Severity: LOW
wire-server is an open-source back end for Wire, a secure collaboration platform. Before version 2.106.0, the CORS ` Access-Control-Allow-Origin ` header set by `nginz` is set for all subdomains of `.wire.com` (including `wire.com`). This means that if somebody were to find an XSS vector in any of the subdomains, they could use it to talk to the Wire API using the user's Cookie. A patch does not exist, but a workaround does. To make sure that a compromise of one subdomain does not yield access to the cookie of another, one may limit the `Access-Control-Allow-Origin` header to apps that actually require the cookie (account-pages, team-settings and the webapp). wire-server Exists in a cross-site scripting vulnerability.Information may be obtained
VAR-202109-0870 CVE-2021-35205 NETSCOUT Systems nGeniusONE  Open redirect vulnerability in CVSS V2: 4.9
CVSS V3: 5.4
Severity: MEDIUM
NETSCOUT Systems nGeniusONE version 6.3.0 build 1196 allows URL redirection in redirector. NETSCOUT Systems nGeniusONE Exists in an open redirect vulnerability.Information may be obtained and information may be tampered with
VAR-202109-0869 CVE-2021-35204 NETSCOUT Systems nGeniusONE  Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Reflected Cross-Site Scripting (XSS) in the support endpoint
VAR-202109-0868 CVE-2021-35203 NETSCOUT Systems nGeniusONE  Vulnerability in externally accessible files or directories in CVSS V2: 3.5
CVSS V3: 5.7
Severity: MEDIUM
NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Arbitrary File Read operations via the FDSQueryService endpoint. NETSCOUT Systems nGeniusONE Exists in a vulnerability in externally accessible files or directories.Information may be obtained
VAR-202109-0867 CVE-2021-35202 NETSCOUT Systems nGeniusONE  Vulnerability in improper permission assignment for critical resources in CVSS V2: 4.3
CVSS V3: 4.3
Severity: MEDIUM
NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Authorization Bypass (to access an endpoint) in FDSQueryService. NETSCOUT Systems nGeniusONE Contains a vulnerability in improper permission assignment for critical resources.Information may be tampered with. nGeniusONE is a service assurance solution from NETSCOUT that provides complete visibility into infrastructure, interdependencies and applications. An attacker could exploit this vulnerability to gain unauthorized access to the endpoint
VAR-202109-0866 CVE-2021-35201 NETSCOUT nGeniusONE  In  XML  External entity vulnerabilities CVSS V2: 4.3
CVSS V3: 6.5
Severity: MEDIUM
NEI in NETSCOUT nGeniusONE 6.3.0 build 1196 allows XML External Entity (XXE) attacks. NETSCOUT nGeniusONE for, XML There is a vulnerability in an external entity.Information may be obtained
VAR-202109-0865 CVE-2021-35200 NETSCOUT nGeniusONE  Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
NETSCOUT nGeniusONE 6.3.0 build 1196 allows high-privileged users to achieve Stored Cross-Site Scripting (XSS) in FDSQueryService
VAR-202109-0864 CVE-2021-35199 NETSCOUT nGeniusONE  Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
NETSCOUT nGeniusONE 6.3.0 build 1196 and earlier allows Stored Cross-Site Scripting (XSS) in UploadFile
VAR-202109-0863 CVE-2021-35198 NETSCOUT nGeniusONE  Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
NETSCOUT nGeniusONE 6.3.0 build 1004 and earlier allows Stored Cross-Site Scripting (XSS) in the Packet Analysis module. NETSCOUT nGeniusONE Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
VAR-202110-1691 CVE-2021-41773 Apache HTTP Server Path Traversal Vulnerability CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013. The server is fast, reliable and extensible through a simple API. This vulnerability is caused by the fact that the ap_normalize_path function is not strictly verified after the introduction of the function. Attackers can use this vulnerability to obtain sensitive information or control the target server. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202208-20 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Apache HTTPD: Multiple Vulnerabilities Date: August 14, 2022 Bugs: #813429, #816399, #816864, #829722, #835131, #850622 ID: 202208-20 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been discovered in Apache Webserver, the worst of which could result in remote code execution. Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-admin/apache-tools < 2.4.54 >= 2.4.54 2 www-servers/apache < 2.4.54 >= 2.4.54 Description ========== Multiple vulnerabilities have been discovered in Apache HTTPD. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Apache HTTPD users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.54" All Apache HTTPD tools users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/apache-tools-2.4.54" References ========= [ 1 ] CVE-2021-33193 https://nvd.nist.gov/vuln/detail/CVE-2021-33193 [ 2 ] CVE-2021-34798 https://nvd.nist.gov/vuln/detail/CVE-2021-34798 [ 3 ] CVE-2021-36160 https://nvd.nist.gov/vuln/detail/CVE-2021-36160 [ 4 ] CVE-2021-39275 https://nvd.nist.gov/vuln/detail/CVE-2021-39275 [ 5 ] CVE-2021-40438 https://nvd.nist.gov/vuln/detail/CVE-2021-40438 [ 6 ] CVE-2021-41524 https://nvd.nist.gov/vuln/detail/CVE-2021-41524 [ 7 ] CVE-2021-41773 https://nvd.nist.gov/vuln/detail/CVE-2021-41773 [ 8 ] CVE-2021-42013 https://nvd.nist.gov/vuln/detail/CVE-2021-42013 [ 9 ] CVE-2021-44224 https://nvd.nist.gov/vuln/detail/CVE-2021-44224 [ 10 ] CVE-2021-44790 https://nvd.nist.gov/vuln/detail/CVE-2021-44790 [ 11 ] CVE-2022-22719 https://nvd.nist.gov/vuln/detail/CVE-2022-22719 [ 12 ] CVE-2022-22720 https://nvd.nist.gov/vuln/detail/CVE-2022-22720 [ 13 ] CVE-2022-22721 https://nvd.nist.gov/vuln/detail/CVE-2022-22721 [ 14 ] CVE-2022-23943 https://nvd.nist.gov/vuln/detail/CVE-2022-23943 [ 15 ] CVE-2022-26377 https://nvd.nist.gov/vuln/detail/CVE-2022-26377 [ 16 ] CVE-2022-28614 https://nvd.nist.gov/vuln/detail/CVE-2022-28614 [ 17 ] CVE-2022-28615 https://nvd.nist.gov/vuln/detail/CVE-2022-28615 [ 18 ] CVE-2022-29404 https://nvd.nist.gov/vuln/detail/CVE-2022-29404 [ 19 ] CVE-2022-30522 https://nvd.nist.gov/vuln/detail/CVE-2022-30522 [ 20 ] CVE-2022-30556 https://nvd.nist.gov/vuln/detail/CVE-2022-30556 [ 21 ] CVE-2022-31813 https://nvd.nist.gov/vuln/detail/CVE-2022-31813 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202208-20 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5
VAR-202109-1948 CVE-2021-34947 Out-of-bounds write vulnerability in multiple Netgear products CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
NETGEAR R7800 net-cgi Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of the soap_block_table file. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13055. D7800 firmware, EX2700 firmware, EX6100 Multiple Netgear products, including firmware, contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The NETGEAR R7800 is an AC2600 dual-band router released by NETGEAR. It supports simultaneous data transmission between multiple devices and achieves a maximum wireless transmission rate of 2.53 Gbps
VAR-202109-1535 CVE-2021-36297 SupportAssist Client Code problem vulnerability CVSS V2: 4.4
CVSS V3: 7.8
Severity: HIGH
SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary .dll file via .dll planting/hijacking, only by a separate administrative action that is not a default part of the SOSInstallerTool.exe installation for executing arbitrary dll's,. DELL Dell SupportAssist Client is a client application of Dell (DELL). The program provides automated, proactive and predictive techniques for troubleshooting and more. There is a code problem vulnerability in SupportAssist Client, which is caused by the management operation in the product arbitrarily loading dll files when loading files. An attacker could exploit this vulnerability to execute arbitrary files. The following products and versions are affected: SupportAssist Client versions 3.8 and 3.9
VAR-202109-1534 CVE-2021-36286 Dell SupportAssist Client Consumer  Past traversal vulnerability in CVSS V2: 3.6
CVSS V3: 7.1
Severity: HIGH
Dell SupportAssist Client Consumer versions 3.9.13.0 and any versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability that can be exploited by using the Windows feature of NTFS called Symbolic links. Symbolic links can be created by any(non-privileged) user under some object directories, but by themselves are not sufficient to successfully escalate privileges. However, combining them with a different object, such as the NTFS junction point allows for the exploitation. Support assist clean files functionality do not distinguish junction points from the physical folder and proceeds to clean the target of the junction that allows nonprivileged users to create junction points and delete arbitrary files on the system which can be accessed only by the admin. Dell SupportAssist Client Consumer Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state. DELL Dell SupportAssist Client is a client application of Dell (DELL). The program provides automated, proactive and predictive techniques for troubleshooting and more. An attacker can combine this vulnerability with an NTFS junction point to escalate privileges and delete files arbitrarily. The following products and versions are affected: Dell SupportAssist Client Consumer version 3.9.13.0 and earlier
VAR-202109-1614 CVE-2021-41753 D-Link DIR-X6060 and D-Link DIR-X1560 denial of service vulnerabilities CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in D-Link DIR-X1560, v1.04B04, and DIR-X6060, v1.11B04 allows a remote unauthenticated attacker to disconnect a wireless client via sending specific spoofed SAE authentication frames. D-Link DIR-X6060 and D-Link DIR-X1560 are both routers of D-Link in Taiwan. D-Link DIR-X6060 and D-Link DIR-X1560 have security vulnerabilities
VAR-202109-1087 CVE-2021-40981 ASUS ROG Armoury Crate Lite  Vulnerability regarding uncontrolled search path elements in CVSS V2: 4.4
CVSS V3: 7.3
Severity: HIGH
ASUS ROG Armoury Crate Lite before 4.2.10 allows local users to gain privileges by placing a Trojan horse file in the publicly writable %PROGRAMDATA%\ASUS\GamingCenterLib directory. (DoS) It may be in a state
VAR-202109-0219 CVE-2021-22272 ABB Mybuildings Code problem vulnerability CVSS V2: 9.0
CVSS V3: 9.4
Severity: CRITICAL
The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch
VAR-202109-1681 CVE-2021-40654 D-LINK-DIR-615  Fraud related to unauthorized authentication in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An information disclosure issue exist in D-LINK-DIR-615 B2 2.01mt. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page. D-LINK-DIR-615 Exists in a fraudulent authentication vulnerability.Information may be obtained. D-Link DIR-615 is a SOHO wireless router with a maximum transmission rate of 300Mbps