VARIoT IoT vulnerabilities database

VAR-202010-1017 | CVE-2020-3514 | Cisco Firepower Threat Defense Software vulnerabilities |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their Cisco FTD instance and execute commands with root privileges in the host namespace. The attacker must have valid credentials on the device.The vulnerability exists because a configuration file that is used at container startup has insufficient protections. An attacker could exploit this vulnerability by modifying a specific container configuration file on the underlying file system. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running Cisco FTD instances or the host Cisco FXOS device. Cisco Firepower Threat Defense (FTD) There are unspecified vulnerabilities in the software.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202010-1048 | CVE-2020-3558 | Cisco Firepower Management Center Open redirect vulnerability in software |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting an HTTP request from a user. A successful exploit could allow the attacker to modify the HTTP request to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites
VAR-202010-1021 | CVE-2020-3533 | Cisco Firepower Threat Defense Software exhaustion vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly. The vulnerability is due to a lack of sufficient memory management protections under heavy SNMP polling loads. An attacker could exploit this vulnerability by sending a high rate of SNMP requests to the SNMP daemon through the management interface on an affected device. A successful exploit could allow the attacker to cause the SNMP daemon process to consume a large amount of system memory over time, which could then lead to an unexpected device restart, causing a denial of service (DoS) condition. This vulnerability affects all versions of SNMP. Cisco Firepower Threat Defense (FTD) Software contains a resource exhaustion vulnerability.Service operation interruption (DoS) It may be put into a state
VAR-202010-1130 | CVE-2020-3583 | Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Cross-site scripting vulnerabilities in software |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. The platform provides features such as highly secure access to data and network resources
VAR-202010-1020 | CVE-2020-3529 | Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software exhaustion vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the SSL VPN negotiation process for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to inefficient direct memory access (DMA) memory management during the negotiation phase of an SSL VPN connection. An attacker could exploit this vulnerability by sending a steady stream of crafted Datagram TLS (DTLS) traffic to an affected device. A successful exploit could allow the attacker to exhaust DMA memory on the device and cause a DoS condition. The platform provides features such as highly secure access to data and network resources
VAR-202010-1009 | CVE-2020-3304 | Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense Software input verification vulnerability |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A vulnerability in the web interface of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition. Note: This vulnerability applies to IP Version 4 (IPv4) and IP Version 6 (IPv6) HTTP traffic. The platform provides features such as highly secure access to data and network resources
VAR-202010-1039 | CVE-2020-3565 | Cisco Firepower Threat Defense Authentication vulnerabilities in software |
CVSS V2: 4.3 CVSS V3: 5.8 Severity: MEDIUM |
A vulnerability in the TCP Intercept functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured Access Control Policies (including Geolocation) and Service Polices on an affected system. The vulnerability exists because TCP Intercept is invoked when the embryonic connection limit is reached, which can cause the underlying detection engine to process the packet incorrectly. An attacker could exploit this vulnerability by sending a crafted stream of traffic that matches a policy on which TCP Intercept is configured. A successful exploit could allow the attacker to match on an incorrect policy, which could allow the traffic to be forwarded when it should be dropped. In addition, the traffic could incorrectly be dropped. Cisco Firepower Threat Defense (FTD) The software contains an authentication vulnerability.Information may be tampered with
VAR-202010-1043 | CVE-2020-3578 | Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense software Unauthorized authentication vulnerability in |
CVSS V2: 5.8 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access rule and access parts of the WebVPN portal that are supposed to be blocked. The vulnerability is due to insufficient validation of URLs when portal access rules are configured. An attacker could exploit this vulnerability by accessing certain URLs on the affected device. The platform provides features such as highly secure access to data and network resources
VAR-202010-1344 | CVE-2020-6648 | FortiOS and FortiProxy Vulnerability of important information in plaintext |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A cleartext storage of sensitive information vulnerability in FortiOS command line interface in versions 6.2.4 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an authenticated attacker to obtain sensitive information such as users passwords by connecting to FortiGate CLI and executing the "diag sys ha checksum show" command. FortiOS and FortiProxy Contains a vulnerability in the plaintext storage of important information.Information may be obtained. Fortinet FortiOS is a set of security operating system dedicated to the FortiGate network security platform developed by Fortinet. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSLVPN, Web content filtering and anti-spam. There is a security vulnerability in FortiOS 6.2.4 and earlier versions
VAR-202010-0305 | CVE-2020-14787 | Oracle Communications of Oracle Communications Diameter Signaling Router In User Interface Vulnerability |
CVSS V2: 4.9 CVSS V3: 5.4 Severity: MEDIUM |
Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) product of Oracle Communications (component: User Interface). Supported versions that are affected are 8.0.0.0-8.4.0.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Diameter Signaling Router (DSR), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Diameter Signaling Router (DSR) accessible data as well as unauthorized read access to a subset of Oracle Communications Diameter Signaling Router (DSR) accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)
VAR-202010-0306 | CVE-2020-14788 | Oracle Communications of Oracle Communications Diameter Signaling Router In User Interface Vulnerability |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) product of Oracle Communications (component: User Interface). Supported versions that are affected are 8.0.0.0-8.4.0.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Diameter Signaling Router (DSR), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Diameter Signaling Router (DSR) accessible data as well as unauthorized read access to a subset of Oracle Communications Diameter Signaling Router (DSR) accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
VAR-202010-1654 | No CVE | SQL injection vulnerability exists in BEESCMS or***_sa***.php file |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
BEESCMS uses PHP+MYSQL, has a multi-language system, and easy expansion of content modules.
The BEESCMS or***_sa***.php file has a SQL injection vulnerability. Attackers can use vulnerabilities to obtain sensitive information in the database.
VAR-202010-1617 | No CVE | Sangfor SSL VPN has command execution vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Sangfor Technology Co., Ltd. is a provider of products, services and solutions focusing on enterprise-level security, cloud computing and infrastructure.
Sangfor SSL VPN has command execution vulnerabilities. Attackers can use the vulnerability to execute arbitrary commands on the server.
VAR-202010-1638 | No CVE | Advantech WebAccess Node has a denial of service vulnerability (CNVD-2020-57243) |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
WebAccess Node is an HMI/SCADA monitoring software completely based on IE browser from Advantech (China) Co., Ltd.
Advantech WebAccess Node has a denial of service vulnerability. An attacker can use this vulnerability to cause a denial of service.
VAR-202010-1639 | No CVE | Advantech WebAccess/SCADA has a denial of service vulnerability (CNVD-2020-57242) |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has a denial of service vulnerability. An attacker can use this vulnerability to cause a denial of service.
VAR-202010-1640 | No CVE | Shanghai ZLAN Information Technology Co., Ltd. ZLAN7144N2 has an arbitrary password reset vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shanghai ZLAN Information Technology Co., Ltd. is a high-tech enterprise that provides industrial IoT solutions. It was established in 2008. Its products include serial server, IoT chips, serial to Ethernet, etc.
Shanghai ZLAN Information Technology Co., Ltd. ZLAN7144N2 has an arbitrary password reset vulnerability. An attacker can use the vulnerability to send a specific message to the port through the network to reset the device's password.
VAR-202010-1438 | CVE-2020-4564 | IBM Sterling B2B Integrator Standard Edition and Sterling File Gateway Cross-site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 and IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 183933. Vendor is responsible for this vulnerability IBM X-Force ID: 183933 Is published as.Information may be obtained and information may be tampered with. The software supports secure integration of complex B2B processes with diverse partner communities
VAR-202010-0514 | CVE-2020-26887 | FRITZ!OS Vulnerability in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
FRITZ!OS before 7.21 on FRITZ!Box devices allows a bypass of a DNS Rebinding protection mechanism. FRITZ!OS Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. AVM Fritz! Box is a wireless router made by AVM in Germany. No detailed vulnerability details are currently provided
VAR-202010-1354 | CVE-2020-4756 | IBM Spectrum Scale and Elastic Storage System Improper Resource Shutdown and Release Vulnerability in |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: MEDIUM |
IBM Spectrum Scale V4.2.0.0 through V4.2.3.23 and V5.0.0.0 through V5.0.5.2 as well as IBM Elastic Storage System 6.0.0 through 6.0.1.0 could allow a local attacker to invoke a subset of ioctls on the device with invalid arguments that could crash the keneral and cause a denial of service. IBM X-Force ID: 188599. Vendor exploits this vulnerability IBM X-Force ID: 188599 Is published as.Denial of service (DoS) It may be put into a state. The IBM Elastic Storage System is a device from IBM of the United States for data management of large data volumes
VAR-202010-0833 | CVE-2020-24375 | Freebox Server Spoofing Authentication Vulnerability in |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
A DNS rebinding vulnerability in the UPnP MediaServer implementation in Freebox Server before 4.2.3. Freebox Server Contains a spoofing authentication evasion vulnerability.Information may be obtained. The Freebox server is a DSL modem, router, Wi-Fi hotspot, NAS (250 GB hard disk), DECT base with up to 8 connected DECT phones, and digital video recorder-T for TNT (also known as DVB) And IPTV.
Versions of Freebox Server prior to 4.2.3 have security vulnerabilities. The vulnerabilities stem from the existence of DNS rebinding vulnerabilities in the implementation of UPnP MediaServer, allowing attackers to gain access to the local area network by manipulating the DNS (Domain Name Service) working mechanism