VARIoT IoT vulnerabilities database
| VAR-202109-0070 | CVE-2020-18684 | Floodlight integer overflow vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Floodlight through 1.2 has an integer overflow in checkFlow in StaticFlowEntryPusherResource.java via priority or port number. Floodlight is an open source OpenFlow controller. No detailed vulnerability details are currently provided
| VAR-202110-0264 | CVE-2021-33626 | InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count
SMM Privilege Escalation 10
SMM Memory Corruption 12
DXE Memory Corruption 1CVE-2020-27339 Affected
CVE-2020-5953 Affected
CVE-2021-33625 Affected
CVE-2021-33626 Affected
CVE-2021-33627 Affected
CVE-2021-41837 Affected
CVE-2021-41838 Affected
CVE-2021-41839 Affected
CVE-2021-41840 Affected
CVE-2021-41841 Affected
CVE-2021-42059 Affected
CVE-2021-42060 Not Affected
CVE-2021-42113 Affected
CVE-2021-42554 Affected
CVE-2021-43323 Affected
CVE-2021-43522 Affected
CVE-2021-43615 Not Affected
CVE-2021-45969 Not Affected
CVE-2021-45970 Not Affected
CVE-2021-45971 Not Affected
CVE-2022-24030 Not Affected
CVE-2022-24031 Not Affected
CVE-2022-24069 Not Affected
CVE-2022-28806 Unknown. InsydeH2O Includes a vulnerability in incorporating functionality from an untrusted control area.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 up to and including 5.5)
| VAR-202109-0160 | CVE-2020-20746 | Tenda AC9 Buffer Overflow Vulnerability (CNVD-2022-26248) |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
A stack-based buffer overflow in the httpd server on Tenda AC9 V15.03.06.60_EN allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via a crafted POST request to /goform/SetStaticRouteCfg. Tenda AC9 is a router device
| VAR-202109-1208 | CVE-2021-41101 | wire-server Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 5.7 Severity: LOW |
wire-server is an open-source back end for Wire, a secure collaboration platform. Before version 2.106.0, the CORS ` Access-Control-Allow-Origin ` header set by `nginz` is set for all subdomains of `.wire.com` (including `wire.com`). This means that if somebody were to find an XSS vector in any of the subdomains, they could use it to talk to the Wire API using the user's Cookie. A patch does not exist, but a workaround does. To make sure that a compromise of one subdomain does not yield access to the cookie of another, one may limit the `Access-Control-Allow-Origin` header to apps that actually require the cookie (account-pages, team-settings and the webapp). wire-server Exists in a cross-site scripting vulnerability.Information may be obtained
| VAR-202109-0870 | CVE-2021-35205 | NETSCOUT Systems nGeniusONE Open redirect vulnerability in |
CVSS V2: 4.9 CVSS V3: 5.4 Severity: MEDIUM |
NETSCOUT Systems nGeniusONE version 6.3.0 build 1196 allows URL redirection in redirector. NETSCOUT Systems nGeniusONE Exists in an open redirect vulnerability.Information may be obtained and information may be tampered with
| VAR-202109-0869 | CVE-2021-35204 | NETSCOUT Systems nGeniusONE Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Reflected Cross-Site Scripting (XSS) in the support endpoint
| VAR-202109-0868 | CVE-2021-35203 | NETSCOUT Systems nGeniusONE Vulnerability in externally accessible files or directories in |
CVSS V2: 3.5 CVSS V3: 5.7 Severity: MEDIUM |
NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Arbitrary File Read operations via the FDSQueryService endpoint. NETSCOUT Systems nGeniusONE Exists in a vulnerability in externally accessible files or directories.Information may be obtained
| VAR-202109-0867 | CVE-2021-35202 | NETSCOUT Systems nGeniusONE Vulnerability in improper permission assignment for critical resources in |
CVSS V2: 4.3 CVSS V3: 4.3 Severity: MEDIUM |
NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Authorization Bypass (to access an endpoint) in FDSQueryService. NETSCOUT Systems nGeniusONE Contains a vulnerability in improper permission assignment for critical resources.Information may be tampered with. nGeniusONE is a service assurance solution from NETSCOUT that provides complete visibility into infrastructure, interdependencies and applications. An attacker could exploit this vulnerability to gain unauthorized access to the endpoint
| VAR-202109-0866 | CVE-2021-35201 | NETSCOUT nGeniusONE In XML External entity vulnerabilities |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
NEI in NETSCOUT nGeniusONE 6.3.0 build 1196 allows XML External Entity (XXE) attacks. NETSCOUT nGeniusONE for, XML There is a vulnerability in an external entity.Information may be obtained
| VAR-202109-0865 | CVE-2021-35200 | NETSCOUT nGeniusONE Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
NETSCOUT nGeniusONE 6.3.0 build 1196 allows high-privileged users to achieve Stored Cross-Site Scripting (XSS) in FDSQueryService
| VAR-202109-0864 | CVE-2021-35199 | NETSCOUT nGeniusONE Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
NETSCOUT nGeniusONE 6.3.0 build 1196 and earlier allows Stored Cross-Site Scripting (XSS) in UploadFile
| VAR-202109-0863 | CVE-2021-35198 | NETSCOUT nGeniusONE Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
NETSCOUT nGeniusONE 6.3.0 build 1004 and earlier allows Stored Cross-Site Scripting (XSS) in the Packet Analysis module. NETSCOUT nGeniusONE Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
| VAR-202110-1691 | CVE-2021-41773 | Apache HTTP Server Path Traversal Vulnerability |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013. The server is fast, reliable and extensible through a simple API. This vulnerability is caused by the fact that the ap_normalize_path function is not strictly verified after the introduction of the function. Attackers can use this vulnerability to obtain sensitive information or control the target server. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202208-20
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Apache HTTPD: Multiple Vulnerabilities
Date: August 14, 2022
Bugs: #813429, #816399, #816864, #829722, #835131, #850622
ID: 202208-20
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Multiple vulnerabilities have been discovered in Apache Webserver, the
worst of which could result in remote code execution.
Affected packages
================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-admin/apache-tools < 2.4.54 >= 2.4.54
2 www-servers/apache < 2.4.54 >= 2.4.54
Description
==========
Multiple vulnerabilities have been discovered in Apache HTTPD. Please
review the CVE identifiers referenced below for details.
Impact
=====
Please review the referenced CVE identifiers for details.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All Apache HTTPD users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.54"
All Apache HTTPD tools users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/apache-tools-2.4.54"
References
=========
[ 1 ] CVE-2021-33193
https://nvd.nist.gov/vuln/detail/CVE-2021-33193
[ 2 ] CVE-2021-34798
https://nvd.nist.gov/vuln/detail/CVE-2021-34798
[ 3 ] CVE-2021-36160
https://nvd.nist.gov/vuln/detail/CVE-2021-36160
[ 4 ] CVE-2021-39275
https://nvd.nist.gov/vuln/detail/CVE-2021-39275
[ 5 ] CVE-2021-40438
https://nvd.nist.gov/vuln/detail/CVE-2021-40438
[ 6 ] CVE-2021-41524
https://nvd.nist.gov/vuln/detail/CVE-2021-41524
[ 7 ] CVE-2021-41773
https://nvd.nist.gov/vuln/detail/CVE-2021-41773
[ 8 ] CVE-2021-42013
https://nvd.nist.gov/vuln/detail/CVE-2021-42013
[ 9 ] CVE-2021-44224
https://nvd.nist.gov/vuln/detail/CVE-2021-44224
[ 10 ] CVE-2021-44790
https://nvd.nist.gov/vuln/detail/CVE-2021-44790
[ 11 ] CVE-2022-22719
https://nvd.nist.gov/vuln/detail/CVE-2022-22719
[ 12 ] CVE-2022-22720
https://nvd.nist.gov/vuln/detail/CVE-2022-22720
[ 13 ] CVE-2022-22721
https://nvd.nist.gov/vuln/detail/CVE-2022-22721
[ 14 ] CVE-2022-23943
https://nvd.nist.gov/vuln/detail/CVE-2022-23943
[ 15 ] CVE-2022-26377
https://nvd.nist.gov/vuln/detail/CVE-2022-26377
[ 16 ] CVE-2022-28614
https://nvd.nist.gov/vuln/detail/CVE-2022-28614
[ 17 ] CVE-2022-28615
https://nvd.nist.gov/vuln/detail/CVE-2022-28615
[ 18 ] CVE-2022-29404
https://nvd.nist.gov/vuln/detail/CVE-2022-29404
[ 19 ] CVE-2022-30522
https://nvd.nist.gov/vuln/detail/CVE-2022-30522
[ 20 ] CVE-2022-30556
https://nvd.nist.gov/vuln/detail/CVE-2022-30556
[ 21 ] CVE-2022-31813
https://nvd.nist.gov/vuln/detail/CVE-2022-31813
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202208-20
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2022 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
| VAR-202109-1948 | CVE-2021-34947 | Out-of-bounds write vulnerability in multiple Netgear products |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
NETGEAR R7800 net-cgi Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the parsing of the soap_block_table file. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13055. D7800 firmware, EX2700 firmware, EX6100 Multiple Netgear products, including firmware, contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The NETGEAR R7800 is an AC2600 dual-band router released by NETGEAR. It supports simultaneous data transmission between multiple devices and achieves a maximum wireless transmission rate of 2.53 Gbps
| VAR-202109-1535 | CVE-2021-36297 | SupportAssist Client Code problem vulnerability |
CVSS V2: 4.4 CVSS V3: 7.8 Severity: HIGH |
SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary .dll file via .dll planting/hijacking, only by a separate administrative action that is not a default part of the SOSInstallerTool.exe installation for executing arbitrary dll's,. DELL Dell SupportAssist Client is a client application of Dell (DELL). The program provides automated, proactive and predictive techniques for troubleshooting and more. There is a code problem vulnerability in SupportAssist Client, which is caused by the management operation in the product arbitrarily loading dll files when loading files. An attacker could exploit this vulnerability to execute arbitrary files. The following products and versions are affected: SupportAssist Client versions 3.8 and 3.9
| VAR-202109-1534 | CVE-2021-36286 | Dell SupportAssist Client Consumer Past traversal vulnerability in |
CVSS V2: 3.6 CVSS V3: 7.1 Severity: HIGH |
Dell SupportAssist Client Consumer versions 3.9.13.0 and any versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability that can be exploited by using the Windows feature of NTFS called Symbolic links. Symbolic links can be created by any(non-privileged) user under some object directories, but by themselves are not sufficient to successfully escalate privileges. However, combining them with a different object, such as the NTFS junction point allows for the exploitation. Support assist clean files functionality do not distinguish junction points from the physical folder and proceeds to clean the target of the junction that allows nonprivileged users to create junction points and delete arbitrary files on the system which can be accessed only by the admin. Dell SupportAssist Client Consumer Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state. DELL Dell SupportAssist Client is a client application of Dell (DELL). The program provides automated, proactive and predictive techniques for troubleshooting and more. An attacker can combine this vulnerability with an NTFS junction point to escalate privileges and delete files arbitrarily. The following products and versions are affected: Dell SupportAssist Client Consumer version 3.9.13.0 and earlier
| VAR-202109-1614 | CVE-2021-41753 | D-Link DIR-X6060 and D-Link DIR-X1560 denial of service vulnerabilities |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in D-Link DIR-X1560, v1.04B04, and DIR-X6060, v1.11B04 allows a remote unauthenticated attacker to disconnect a wireless client via sending specific spoofed SAE authentication frames. D-Link DIR-X6060 and D-Link DIR-X1560 are both routers of D-Link in Taiwan.
D-Link DIR-X6060 and D-Link DIR-X1560 have security vulnerabilities
| VAR-202109-1087 | CVE-2021-40981 | ASUS ROG Armoury Crate Lite Vulnerability regarding uncontrolled search path elements in |
CVSS V2: 4.4 CVSS V3: 7.3 Severity: HIGH |
ASUS ROG Armoury Crate Lite before 4.2.10 allows local users to gain privileges by placing a Trojan horse file in the publicly writable %PROGRAMDATA%\ASUS\GamingCenterLib directory. (DoS) It may be in a state
| VAR-202109-0219 | CVE-2021-22272 | ABB Mybuildings Code problem vulnerability |
CVSS V2: 9.0 CVSS V3: 9.4 Severity: CRITICAL |
The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch
| VAR-202109-1681 | CVE-2021-40654 | D-LINK-DIR-615 Fraud related to unauthorized authentication in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
An information disclosure issue exist in D-LINK-DIR-615 B2 2.01mt. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page. D-LINK-DIR-615 Exists in a fraudulent authentication vulnerability.Information may be obtained. D-Link DIR-615 is a SOHO wireless router with a maximum transmission rate of 300Mbps