VARIoT IoT vulnerabilities database

VAR-202011-0790 | CVE-2020-27556 | BASETech GE-131 BT-1837836 Firmware vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A predictable device ID in BASETech GE-131 BT-1837836 firmware 20180921 allows unauthenticated remote attackers to connect to the device. BASETech GE-131 BT-1837836 There is an unspecified vulnerability in the firmware.Information may be tampered with. BASETech GE-131 BT-1837836 is a Wi-Fi IP CCTV camera
VAR-202011-1431 | CVE-2020-4592 | IBM MQ Appliance Vulnerability in |
CVSS V2: 3.5 CVSS V3: 6.5 Severity: Medium |
IBM MQ Appliance 9.1.CD and LTS could allow an authenticated user, under nondefault configuration to cause a data corruption attack due to an error when using segmented messages. IBM MQ Appliance Contains an unspecified vulnerability.Information may be tampered with
VAR-202105-0131 | CVE-2020-25709 | OpenLDAP Reachable assertion vulnerabilities in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability. OpenLDAP Exists in a reachable assertion vulnerability.Denial of service (DoS) It may be put into a state. Summary:
The Migration Toolkit for Containers (MTC) 1.5.4 is now available. Description:
The Migration Toolkit for Containers (MTC) enables you to migrate
Kubernetes resources, persistent volume data, and internal container images
between OpenShift Container Platform clusters, using the MTC web console or
the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/):
1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic
5. Summary:
Red Hat Advanced Cluster Management for Kubernetes 2.2.11 General
Availability release images, which provide one or more container updates
and bug fixes. Description:
Red Hat Advanced Cluster Management for Kubernetes 2.2.11 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments.
Clusters and applications are all visible and managed from a single console
— with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which provide security fixes, bug fixes and
container upgrades. See the following Release Notes documentation, which
will be updated shortly for this release, for additional details about this
release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/
Security updates:
* object-path: Type confusion vulnerability can lead to a bypass of
CVE-2020-15256 (CVE-2021-23434)
* follow-redirects: Exposure of Private Personal Information to an
Unauthorized Actor (CVE-2022-0155)
Related bugs:
* RHACM 2.2.11 images (Bugzilla #2029508)
* ClusterImageSet has 4.5 which is not supported in ACM 2.2.10 (Bugzilla
#2030859)
3. Bugs fixed (https://bugzilla.redhat.com/):
1999810 - CVE-2021-23434 object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256
2029508 - RHACM 2.2.11 images
2030859 - ClusterImageSet has 4.5 which is not supported in ACM 2.2.10
2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor
5. Description:
Red Hat Openshift GitOps is a declarative way to implement continuous
deployment for cloud native applications. Bugs fixed (https://bugzilla.redhat.com/):
2062751 - CVE-2022-24730 argocd: path traversal and improper access control allows leaking out-of-bound files
2062755 - CVE-2022-24731 argocd: path traversal allows leaking out-of-bound files
2064682 - CVE-2022-1025 Openshift-Gitops: Improper access control allows admin privilege escalation
5. =========================================================================
Ubuntu Security Notice USN-4634-2
November 23, 2020
openldap vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM
Summary:
OpenLDAP could be made to crash if it received specially crafted network
traffic. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that OpenLDAP incorrectly handled certain malformed
inputs. A remote attacker could possibly use this issue to cause OpenLDAP
to crash, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
slapd 2.4.31-1+nmu2ubuntu8.5+esm4
Ubuntu 12.04 ESM:
slapd 2.4.28-1.1ubuntu4.12
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: openldap security update
Advisory ID: RHSA-2022:0621-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0621
Issue date: 2022-02-22
CVE Names: CVE-2020-25709 CVE-2020-25710
=====================================================================
1. Summary:
An update for openldap is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
OpenLDAP is an open-source suite of Lightweight Directory Access Protocol
(LDAP) applications and development tools. LDAP is a set of protocols used
to access and maintain distributed directory information services over an
IP network.
Security Fix(es):
* openldap: assertion failure in Certificate List syntax validation
(CVE-2020-25709)
* openldap: assertion failure in CSN normalization with invalid input
(CVE-2020-25710)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1899675 - CVE-2020-25709 openldap: assertion failure in Certificate List syntax validation
1899678 - CVE-2020-25710 openldap: assertion failure in CSN normalization with invalid input
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
openldap-2.4.44-25.el7_9.src.rpm
x86_64:
openldap-2.4.44-25.el7_9.i686.rpm
openldap-2.4.44-25.el7_9.x86_64.rpm
openldap-clients-2.4.44-25.el7_9.x86_64.rpm
openldap-debuginfo-2.4.44-25.el7_9.i686.rpm
openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
openldap-debuginfo-2.4.44-25.el7_9.i686.rpm
openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm
openldap-devel-2.4.44-25.el7_9.i686.rpm
openldap-devel-2.4.44-25.el7_9.x86_64.rpm
openldap-servers-2.4.44-25.el7_9.x86_64.rpm
openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
openldap-2.4.44-25.el7_9.src.rpm
x86_64:
openldap-2.4.44-25.el7_9.i686.rpm
openldap-2.4.44-25.el7_9.x86_64.rpm
openldap-clients-2.4.44-25.el7_9.x86_64.rpm
openldap-debuginfo-2.4.44-25.el7_9.i686.rpm
openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
openldap-debuginfo-2.4.44-25.el7_9.i686.rpm
openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm
openldap-devel-2.4.44-25.el7_9.i686.rpm
openldap-devel-2.4.44-25.el7_9.x86_64.rpm
openldap-servers-2.4.44-25.el7_9.x86_64.rpm
openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
openldap-2.4.44-25.el7_9.src.rpm
ppc64:
openldap-2.4.44-25.el7_9.ppc.rpm
openldap-2.4.44-25.el7_9.ppc64.rpm
openldap-clients-2.4.44-25.el7_9.ppc64.rpm
openldap-debuginfo-2.4.44-25.el7_9.ppc.rpm
openldap-debuginfo-2.4.44-25.el7_9.ppc64.rpm
openldap-devel-2.4.44-25.el7_9.ppc.rpm
openldap-devel-2.4.44-25.el7_9.ppc64.rpm
openldap-servers-2.4.44-25.el7_9.ppc64.rpm
ppc64le:
openldap-2.4.44-25.el7_9.ppc64le.rpm
openldap-clients-2.4.44-25.el7_9.ppc64le.rpm
openldap-debuginfo-2.4.44-25.el7_9.ppc64le.rpm
openldap-devel-2.4.44-25.el7_9.ppc64le.rpm
openldap-servers-2.4.44-25.el7_9.ppc64le.rpm
s390x:
openldap-2.4.44-25.el7_9.s390.rpm
openldap-2.4.44-25.el7_9.s390x.rpm
openldap-clients-2.4.44-25.el7_9.s390x.rpm
openldap-debuginfo-2.4.44-25.el7_9.s390.rpm
openldap-debuginfo-2.4.44-25.el7_9.s390x.rpm
openldap-devel-2.4.44-25.el7_9.s390.rpm
openldap-devel-2.4.44-25.el7_9.s390x.rpm
openldap-servers-2.4.44-25.el7_9.s390x.rpm
x86_64:
openldap-2.4.44-25.el7_9.i686.rpm
openldap-2.4.44-25.el7_9.x86_64.rpm
openldap-clients-2.4.44-25.el7_9.x86_64.rpm
openldap-debuginfo-2.4.44-25.el7_9.i686.rpm
openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm
openldap-devel-2.4.44-25.el7_9.i686.rpm
openldap-devel-2.4.44-25.el7_9.x86_64.rpm
openldap-servers-2.4.44-25.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
openldap-debuginfo-2.4.44-25.el7_9.ppc64.rpm
openldap-servers-sql-2.4.44-25.el7_9.ppc64.rpm
ppc64le:
openldap-debuginfo-2.4.44-25.el7_9.ppc64le.rpm
openldap-servers-sql-2.4.44-25.el7_9.ppc64le.rpm
s390x:
openldap-debuginfo-2.4.44-25.el7_9.s390x.rpm
openldap-servers-sql-2.4.44-25.el7_9.s390x.rpm
x86_64:
openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm
openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
openldap-2.4.44-25.el7_9.src.rpm
x86_64:
openldap-2.4.44-25.el7_9.i686.rpm
openldap-2.4.44-25.el7_9.x86_64.rpm
openldap-clients-2.4.44-25.el7_9.x86_64.rpm
openldap-debuginfo-2.4.44-25.el7_9.i686.rpm
openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm
openldap-devel-2.4.44-25.el7_9.i686.rpm
openldap-devel-2.4.44-25.el7_9.x86_64.rpm
openldap-servers-2.4.44-25.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm
openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-25709
https://access.redhat.com/security/cve/CVE-2020-25710
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=OWtf
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
VAR-202011-0731 | CVE-2020-27125 | Cisco Security Manager Input confirmation vulnerability |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability in Cisco Security Manager could allow an unauthenticated, remote attacker to access sensitive information on an affected system. The vulnerability is due to insufficient protection of static credentials in the affected software. An attacker could exploit this vulnerability by viewing source code. A successful exploit could allow the attacker to view static credentials, which the attacker could use to carry out further attacks. Cisco Security Manager (CSM) is a set of enterprise-level management applications from Cisco, which is mainly used to configure firewall, VPN and intrusion prevention security services on Cisco network and security devices
VAR-202011-0735 | CVE-2020-27130 | Cisco Security Manager Vulnerability in |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
A vulnerability in Cisco Security Manager could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within requests to an affected device. An attacker could exploit this vulnerability by sending a crafted request to the affected device. A successful exploit could allow the attacker to download arbitrary files from the affected device. Cisco Security Manager (CSM) is a set of enterprise-level management applications from Cisco, which is mainly used to configure firewall, VPN and intrusion prevention security services on Cisco network and security devices
VAR-202011-0393 | CVE-2020-26701 | Kaa IoT Platform Cross-site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Dashboards section in Kaa IoT Platform v1.2.0 allows remote attackers to inject malicious web scripts or HTML Injection payloads via the Description parameter. Kaa IoT Platform Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. The platform provides protocol support for multiple devices, and provides monitoring and data management functions for connected devices
VAR-202011-0736 | CVE-2020-27131 | Cisco Security Manager Untrusted Data Deserialization Vulnerability in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Multiple vulnerabilities in the Java deserialization function that is used by Cisco Security Manager could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. These vulnerabilities are due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit these vulnerabilities by sending a malicious serialized Java object to a specific listener on an affected system. A successful exploit could allow the attacker to execute arbitrary commands on the device with the privileges of NT AUTHORITY\SYSTEM on the Windows target host. Cisco has not released software updates that address these vulnerabilities. Cisco Security Manager There is a vulnerability in deserialization of untrusted data.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco Security Manager (CSM) is a set of enterprise-level management applications from Cisco, which is mainly used to configure firewall, VPN and intrusion prevention security services on Cisco network and security devices. Successful exploitation could result in arbitrary command execution on the affected device
VAR-202012-1523 | CVE-2020-9972 | plural Apple Product Buffer Overflow Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 14.0 and iPadOS 14.0. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. The following products and versions are affected: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later
VAR-202011-0266 | CVE-2019-19560 | Mercedes-Benz HERMES Vulnerability in insecure storage of important information in |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
An authentication bypass in the debug interface in Mercedes-Benz HERMES 1.5 allows an attacker with physical access to device hardware to obtain system information. Mercedes-Benz HERMES There is a vulnerability in the insecure storage of important information.Information may be obtained. Mercedes-Benz HERMES is a telematics control unit equipped in Mercedes-Benz (Mercedes-Benz) networked cars
VAR-202011-0267 | CVE-2019-19561 | Mercedes-Benz HERMES Vulnerability in insecure storage of important information in |
CVSS V2: 2.1 CVSS V3: 2.4 Severity: LOW |
A misconfiguration in the debug interface in Mercedes-Benz HERMES 1.5 allows an attacker with direct physical access to device hardware to obtain cellular modem information. Mercedes-Benz HERMES There is a vulnerability in the insecure storage of important information.Information may be obtained. Mercedes-Benz HERMES is a telematics control unit equipped in Mercedes-Benz (Mercedes-Benz) networked cars
VAR-202011-0265 | CVE-2019-19557 | Mercedes-Benz HERMES Vulnerability in insecure storage of important information in |
CVSS V2: 2.1 CVSS V3: 2.4 Severity: LOW |
A misconfiguration in the debug interface in Mercedes-Benz HERMES 1 allows an attacker with direct physical access to device hardware to obtain cellular modem information. Mercedes-Benz HERMES There is a vulnerability in the insecure storage of important information.Information may be obtained. Mercedes-Benz HERMES is a telematics control unit equipped in Mercedes-Benz (Mercedes-Benz) networked cars.
The debug interface in Mercedes-Benz HERMES 1 has a configuration error vulnerability
VAR-202011-0268 | CVE-2019-19562 | Mercedes-Benz HERMES Vulnerability in insecure storage of important information in |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
An authentication bypass in the debug interface in Mercedes-Benz HERMES 2.1 allows an attacker with physical access to device hardware to obtain system information. Mercedes-Benz HERMES There is a vulnerability in the insecure storage of important information.Information may be obtained. Mercedes-Benz HERMES is a telematics control unit equipped in Mercedes-Benz (Mercedes-Benz) networked cars
VAR-202011-0269 | CVE-2019-19563 | Mercedes-Benz HERMES configuration error vulnerability |
CVSS V2: 2.1 CVSS V3: 2.4 Severity: LOW |
A misconfiguration in the debug interface in Mercedes-Benz HERMES 2.1 allows an attacker with direct physical access to device hardware to obtain cellular modem information. Mercedes-Benz HERMES Contains an unspecified vulnerability.Information may be obtained. Mercedes-Benz HERMES is a telematics control unit equipped in Mercedes-Benz (Mercedes-Benz) networked cars.
The debugging interface in Mercedes-Benz HERMES 2.1 has a configuration error vulnerability
VAR-202011-0264 | CVE-2019-19556 | Mercedes-Benz HERMES Authentication vulnerabilities in |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
An authentication bypass in the debug interface in Mercedes-Benz HERMES 1 allows an attacker with physical access to device hardware to obtain system information. Mercedes-Benz HERMES Contains an authentication vulnerability.Information may be obtained. Mercedes-Benz HERMES is a telematics control unit equipped in Mercedes-Benz (Mercedes-Benz) networked cars
VAR-202011-1543 | No CVE | Beijing Sifang Relay Automation Co., Ltd. CSC-830 has a denial of service vulnerability (CNVD-2020-59456) |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
CSC830 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small and medium discrete automation systems and independent automation systems.
Beijing Sifang Relay Automation Co., Ltd. CSC-830 has a denial of service vulnerability. Attackers can use this vulnerability to control PLC services, affecting the normal operation of the controller and causing denial of service.
VAR-202011-1545 | No CVE | Beijing Sifang Relay Automation Co., Ltd. CSC-830 has a denial of service vulnerability (CNVD-2020-59455) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
CSC830 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small and medium discrete automation systems and independent automation systems.
Beijing Sifang Relay Automation Co., Ltd. CSC-830 has a denial of service vulnerability. Attackers can use this vulnerability to directly control the cold start or stop of the PLC remotely, affecting the normal operation of the controller.
VAR-202011-1561 | No CVE | Beijing Sifang Relay Automation Co., Ltd. CSC-830 has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
CSC830 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small and medium discrete automation systems and independent automation systems.
Beijing Sifang Relay Automation Co., Ltd. CSC-830 has a denial of service vulnerability. Attackers can use the vulnerability to cause a denial of server.
VAR-202011-1562 | No CVE | Beijing Sifang Relay Automation Co., Ltd. CSC-830 has an information disclosure vulnerability (CNVD-2020-59458) |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
CSC830 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small and medium discrete automation systems and independent automation systems.
Beijing Sifang Relay Automation Co., Ltd. CSC-830 has an information disclosure vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202011-1563 | No CVE | Beijing Sifang Relay Automation Co., Ltd. CSC-850 has an information disclosure vulnerability (CNVD-2020-58374) |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
CSC850 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small and medium discrete automation systems and independent automation systems.
Beijing Sifang Relay Automation Co., Ltd. CSC-850 has an information disclosure vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202011-1564 | No CVE | Beijing Sifang Relay Automation Co., Ltd. CSC-850 has an information disclosure vulnerability (CNVD-2020-58375) |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
CSC850 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small and medium discrete automation systems and independent automation systems.
Beijing Sifang Relay Automation Co., Ltd. CSC-850 has an information disclosure vulnerability. Attackers can use this vulnerability to obtain sensitive information such as PLC logs, firmware, configuration and other core files.