VARIoT IoT vulnerabilities database

VAR-202012-1630 | No CVE | China Mobile Railway Tongyu routing has an information disclosure vulnerability (CNVD-2020-67110) |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
YuRoute is an IoT router.
China Mobile Railway Tongyu routing has information leakage vulnerabilities. Attackers can use vulnerabilities to obtain sensitive information.
VAR-202012-1628 | No CVE | Zero Vision Technology (Shanghai) Co., Ltd. H5S CONSOLE has an unauthorized access vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Zero Vision Technology (Shanghai) Co., Ltd. serves customers with leading video technology and is committed to simplifying the development of Internet of Things video. Relying on new technologies such as HTML5 WebRTC, it realizes the simplification of video playback on all platforms.
Zero Vision Technology (Shanghai) Co., Ltd. H5S CONSOLE has an unauthorized access vulnerability. Attackers can use vulnerabilities to access corresponding ports in the background and perform unauthorized operations.
VAR-202012-1588 | No CVE | Rockchip has a binary vulnerability (CNVD-2020-67105) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Rockchip Microelectronics Co., Ltd. has a R&D team specializing in system-level chip design and algorithm research, providing professional chip solutions for high-end smart hardware, mobile phone peripherals, tablet computers, TV set-top boxes, industrial control and other fields.
Rockchip has a binary vulnerability. Attackers can use this vulnerability to cause the program to crash.
VAR-202012-1589 | No CVE | Rockchip has a binary vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Rockchip Microelectronics Co., Ltd. has a R&D team specializing in system-level chip design and algorithm research, providing professional chip solutions for high-end smart hardware, mobile phone peripherals, tablet computers, TV set-top boxes, industrial control and other fields.
Rockchip has a binary vulnerability. Attackers can use this vulnerability to cause the program to crash.
VAR-202012-1615 | No CVE | Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability (CNVD-2020-67121) |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Tricon safety instrumented system is the safety instrumented system of Schneider Electric Co., Ltd., MP3009 module is the processor module of Schneider Tricon safety instrumented system.
Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability. An attacker can use this vulnerability to launch a denial of service attack.
VAR-202012-1616 | No CVE | Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability (CNVD-2020-67122) |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Tricon safety instrumented system is the safety instrumented system of Schneider Electric Co., Ltd., MP3009 module is the processor module of Schneider Tricon safety instrumented system.
Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability. An attacker can use this vulnerability to launch a denial of service attack.
VAR-202012-1617 | No CVE | Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability (CNVD-2020-67123) |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Tricon safety instrumented system is the safety instrumented system of Schneider Electric Co., Ltd., MP3009 module is the processor module of Schneider Tricon safety instrumented system.
Schneider Tricon safety instrumented system MP3009 processor has a denial of service vulnerability. An attacker can use this vulnerability to launch a denial of service attack.
VAR-202012-0811 | CVE-2020-28094 | Tenda AC1200 Vulnerabilities in devices |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
On Tenda AC1200 (Model AC6) 15.03.06.51_multi devices, the default settings for the router speed test contain links to download malware named elive or CNKI E-Learning. Tenda AC1200 (Model AC6) An unspecified vulnerability exists in the device.Information may be obtained. Tenda AC1200 is a wireless router of China Tenda (Tenda) company. No detailed vulnerability details are currently provided
VAR-202012-0810 | CVE-2020-28093 | Tenda AC1200 Vulnerabilities in devices |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
On Tenda AC1200 (Model AC6) 15.03.06.51_multi devices, admin, support, user, and nobody have a password of 1234. Tenda AC1200 (Model AC6) An unspecified vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Tenda AC1200 is a wireless router of China Tenda (Tenda) company.
Tenda AC1200 (Model AC6) 15.03.06.51_multi has a default credential disclosure vulnerability. The default password is 1234. Attackers can use this default credential to log in to the management device
VAR-202012-1528 | CVE-2020-14273 | HCL Domino Input confirmation vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
HCL Domino is susceptible to a Denial of Service (DoS) vulnerability due to insufficient validation of input to its public API. An unauthenticated attacker could could exploit this vulnerability to crash the Domino server
VAR-202012-1539 | CVE-2020-35728 | FasterXML, LLC of Jackson-databind Vulnerabilities related to deserialization of untrusted data in products from multiple vendors |
CVSS V2: 6.8 CVSS V3: 8.1 Severity: HIGH |
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl). FasterXML, LLC of Jackson-databind There are vulnerabilities related to the deserialization of untrusted data in products from multiple vendors, such as:Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. FasterXML jackson-databind is a library based on JAVA that can convert data formats such as XML and JSON to JAVA objects. Jackson can easily convert Java objects into json objects and xml documents, as well as convert json and xml into Java objects. FasterXML jackson-databind versions 2.x to 2.9.10.8 have a security vulnerability, which stems from incorrectly handling the interaction between serialization widgets and types, involving com.oracle.wls.shaded.org.apache. xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl). -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: OpenShift Container Platform 4.6.26 security and extras update
Advisory ID: RHSA-2021:1230-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2021:1230
Issue date: 2021-04-27
CVE Names: CVE-2018-14718 CVE-2018-14719 CVE-2018-14720
CVE-2018-14721 CVE-2018-19360 CVE-2018-19361
CVE-2018-19362 CVE-2019-14379 CVE-2020-24750
CVE-2020-35490 CVE-2020-35491 CVE-2020-35728
CVE-2020-36179 CVE-2020-36180 CVE-2020-36181
CVE-2020-36182 CVE-2020-36183 CVE-2020-36184
CVE-2020-36185 CVE-2020-36186 CVE-2020-36187
CVE-2020-36188 CVE-2020-36189 CVE-2021-3449
CVE-2021-20190
=====================================================================
1. Summary:
Red Hat OpenShift Container Platform release 4.6.26 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container
Platform 4.6.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
3. Solution:
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.6.26. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2021:1232
All OpenShift Container Platform 4.6 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
- -between-minor.html#understanding-upgrade-channels_updating-cluster-between
- -minor
For OpenShift Container Platform 4.6 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel
ease-notes.html
Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
- -cli.html
4. Bugs fixed (https://bugzilla.redhat.com/):
1666415 - CVE-2018-14718 jackson-databind: arbitrary code execution in slf4j-ext class
1666418 - CVE-2018-14719 jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
1666423 - CVE-2018-14720 jackson-databind: exfiltration/XXE in some JDK classes
1666428 - CVE-2018-14721 jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
1666482 - CVE-2018-19360 jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
1666484 - CVE-2018-19361 jackson-databind: improper polymorphic deserialization in openjpa class
1666489 - CVE-2018-19362 jackson-databind: improper polymorphic deserialization in jboss-common-core class
1737517 - CVE-2019-14379 jackson-databind: default typing mishandling leading to remote code execution
1859004 - Sometimes the eventrouter couldn't gather event logs. References:
https://access.redhat.com/security/cve/CVE-2018-14718
https://access.redhat.com/security/cve/CVE-2018-14719
https://access.redhat.com/security/cve/CVE-2018-14720
https://access.redhat.com/security/cve/CVE-2018-14721
https://access.redhat.com/security/cve/CVE-2018-19360
https://access.redhat.com/security/cve/CVE-2018-19361
https://access.redhat.com/security/cve/CVE-2018-19362
https://access.redhat.com/security/cve/CVE-2019-14379
https://access.redhat.com/security/cve/CVE-2020-24750
https://access.redhat.com/security/cve/CVE-2020-35490
https://access.redhat.com/security/cve/CVE-2020-35491
https://access.redhat.com/security/cve/CVE-2020-35728
https://access.redhat.com/security/cve/CVE-2020-36179
https://access.redhat.com/security/cve/CVE-2020-36180
https://access.redhat.com/security/cve/CVE-2020-36181
https://access.redhat.com/security/cve/CVE-2020-36182
https://access.redhat.com/security/cve/CVE-2020-36183
https://access.redhat.com/security/cve/CVE-2020-36184
https://access.redhat.com/security/cve/CVE-2020-36185
https://access.redhat.com/security/cve/CVE-2020-36186
https://access.redhat.com/security/cve/CVE-2020-36187
https://access.redhat.com/security/cve/CVE-2020-36188
https://access.redhat.com/security/cve/CVE-2020-36189
https://access.redhat.com/security/cve/CVE-2021-3449
https://access.redhat.com/security/cve/CVE-2021-20190
https://access.redhat.com/security/updates/classification/#important
6. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=CKcx
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
. JIRA issues fixed (https://issues.jboss.org/):
LOG-1224 - Release 5.0 - ClusterLogForwarder namespace-specific log forwarding does not work as expected
LOG-1232 - 5.0 - Bug 1859004 - Sometimes the eventrouter couldn't gather event logs.
LOG-1234 - CVE-2020-15586 CVE-2020-16845 openshift-eventrouter: various flaws [openshift-4]
LOG-1299 - Release 5.0 Forwarding logs to Kafka using Chained certificates fails with error "state=error: certificate verify failed (unable to get local issuer certificate)"
5
VAR-202012-1576 | No CVE | Shenzhen Yichen Technology Development Co., Ltd. JCG-JHR router has command execution vulnerability |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
The main business scope of Shenzhen Yichen Technology Development Co., Ltd.: network cards, graphics cards, wireless routers, modems, switches, etc.
Shenzhen Yichen Technology Development Co., Ltd. JCG-JHR router has a command execution vulnerability. Attackers can use the vulnerability to gain server control authority.
VAR-202012-1579 | No CVE | Tenda routers have denial of service vulnerabilities |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Tenda AC9, AC15, and AC18 are wireless routers.
Tenda router has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202012-1618 | No CVE | Mijia Lamp Pro has unauthorized access vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Mijia table lamp pro is a table lamp with a very simple appearance, beautiful lines, very practical color temperature adjustment, soft and stable light.
Mijia Lamp Pro has an unauthorized access vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202012-1100 | CVE-2020-35714 | Belkin International, Inc. of re6500 in the firmware OS Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Belkin LINKSYS RE6500 devices before 1.0.11.001 allow remote authenticated users to execute arbitrary commands via goform/systemCommand?command= in conjunction with the goform/pingstart program. Belkin International, Inc. of re6500 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Linksys RE6500 is an AC1200 dual-band WiFi extender launched by Belkin.
Belkin LINKSYS RE6500 versions before 1.0.012.001 have a code injection vulnerability
VAR-202012-1101 | CVE-2020-35715 | Belkin International, Inc. of re6500 in the firmware OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote authenticated users to execute arbitrary commands via shell metacharacters in a filename to the upload_settings.cgi page. Belkin International, Inc. of re6500 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Linksys RE6500 is an AC1200 dual-band WiFi extender launched by Belkin.
Belkin LINKSYS RE6500 has a code injection vulnerability before 1.0.012.001
VAR-202012-1102 | CVE-2020-35716 | Belkin International, Inc. of re6500 Firmware vulnerabilities |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to cause a persistent denial of service (segmentation fault) via a long /goform/langSwitch langSelectionOnly parameter. Belkin International, Inc. of re6500 There are unspecified vulnerabilities in the firmware.Service operation interruption (DoS) It may be in a state. Linksys RE6500 is an AC1200 dual-band WiFi extender launched by Belkin.
Belkin LINKSYS RE6500 versions before 1.0.012.001 have a denial of service vulnerability
VAR-202012-1581 | No CVE | There is a binary vulnerability in the soft routing of the community ISP version of Shenzhen Baiwei Tongda Technology Co., Ltd. |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Shenzhen Baiwei Tongda Technology Co., Ltd. is a supplier dedicated to providing leading network solutions for Internet cafes, communities, hotels, enterprises, and public Internet places.
There are binary vulnerabilities in the soft routing of the community ISP version of Shenzhen Baiwei Tongda Technology Co., Ltd. Attackers can use vulnerabilities to submit special requests and gain router control rights.
VAR-202012-1096 | CVE-2020-35710 | Parallels of Remote Application Server Vulnerability regarding information leakage in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data. Parallels of Remote Application Server There is a vulnerability related to information leakage.Information may be obtained
VAR-202012-1159 | CVE-2020-35575 |
plural TP-LINK Technologies Product vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-202106-0266 |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A password-disclosure issue in the web interface on certain TP-Link devices allows a remote attacker to get full administrative access to the web panel. This affects WA901ND devices before 3.16.9(201211) beta, and Archer C5, Archer C7, MR3420, MR6400, WA701ND, WA801ND, WDR3500, WDR3600, WE843N, WR1043ND, WR1045ND, WR740N, WR741ND, WR749N, WR802N, WR840N, WR841HP, WR841N, WR842N, WR842ND, WR845N, WR940N, WR941HP, WR945N, WR949N, and WRD4300 devices. TP-LINK Technologies There are unspecified vulnerabilities in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state