VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202101-1052 CVE-2021-1271 Cisco Web  Cross-site scripting vulnerabilities in security virtual appliances CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface. Cisco Web Security Appliance is a web security appliance. The appliance provides SaaS-based access control, real-time network reporting and tracking, and security policy formulation. Cisco AsyncOS is an operating system for Cisco devices
VAR-202101-1054 CVE-2021-1273 plural  Cisco SD-WAN  Buffer error vulnerability in the product CVSS V2: 7.8
CVSS V3: 8.6
Severity: HIGH
Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco SD-WAN The product contains a buffer error vulnerability.Denial of service (DoS) It may be put into a state. Cisco SD-WAN vEdge is a router from Cisco of the United States. This device can provide basic WAN, security and multi-cloud functions for Cisco SD-WAN solutions. Cisco SD-WAN vManage is a software from Cisco (Cisco) that provides software-defined network functions. This software is a way of network virtualization. The IPSec tunnel function of Cisco SD-WAN software has a denial of service vulnerability. The vulnerability stems from boundary checks in the forwarding plane of the IPSec tunnel management function
VAR-202101-1059 CVE-2021-1279 plural  Cisco SD-WAN  Buffer error vulnerability in the product CVSS V2: 7.8
CVSS V3: 8.6
Severity: HIGH
Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco SD-WAN The product contains a buffer error vulnerability.Denial of service (DoS) It may be put into a state. Cisco SD-WAN vEdge is a router from Cisco of the United States. This device can provide basic WAN, security and multi-cloud functions for Cisco SD-WAN solutions. Cisco SD-WAN vManage is a software from Cisco (Cisco) that provides software-defined network functions. This software is a way of network virtualization. Many Cisco SD-WAN products have buffer overflow vulnerabilities. The vulnerability stems from the program's failure to correctly verify and check the input of the SNMPv3 management function
VAR-202101-1055 CVE-2021-1274 plural  Cisco SD-WAN  Buffer error vulnerability in the product CVSS V2: 7.8
CVSS V3: 8.6
Severity: HIGH
Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco SD-WAN The product contains a buffer error vulnerability.Denial of service (DoS) It may be put into a state. Cisco SD-WAN vEdge is a router from Cisco of the United States. This device can provide basic WAN, security and multi-cloud functions for Cisco SD-WAN solutions. Cisco SD-WAN vManage is a software from Cisco (Cisco) that provides software-defined network functions. This software is a way of network virtualization. The UDP link response of Cisco SD-WAN software has a denial of service vulnerability. The vulnerability is caused by a null pointer dereference in vDaemon
VAR-202102-0637 CVE-2021-22293 plural  Huawei  In the product  HTTP  Request Smuggling Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Some Huawei products have an inconsistent interpretation of HTTP requests vulnerability. Attackers can exploit this vulnerability to cause information leak. Affected product versions include: CampusInsight versions V100R019C10; ManageOne versions 6.5.1.1, 6.5.1.SPC100, 6.5.1.SPC200, 6.5.1RC1, 6.5.1RC2, 8.0.RC2. Affected product versions include: Taurus-AL00A versions 10.0.0.1(C00E1R1P1). CampusInsight , ManageOne , Taurus-AL00A There is a vulnerability related to.Information may be obtained. Huawei Manageone is a set of cloud data center management solutions of China Huawei (Huawei). The product supports unified management of heterogeneous cloud resource pools, and provides functions such as multi-level VDC matching customer organization model, service catalog planning, self-service, centralized alarm analysis, and intelligent operation and maintenance. The vulnerability exists in the following devices or models: ManageOne 6.5.1.1, ManageOne 6.5.1.SPC100, ManageOne 6.5.1.SPC200, ManageOne 6.5.1RC1, ManageOne 6.5.1RC2, ManageOne 8.0.RC2
VAR-202101-1042 CVE-2021-1301 plural  Cisco SD-WAN  Classic buffer overflow vulnerability in the product CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco SD-WAN The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202101-1046 CVE-2021-1263 Multiple Cisco Product Command Injection Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory
VAR-202101-1045 CVE-2021-1262 Multiple Cisco Product Command Injection Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory
VAR-202101-0306 CVE-2020-25173 Reolink Made P2P Cameras Multiple vulnerabilities in the series CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
An attacker with local network access can obtain a fixed cryptography key which may allow for further compromise of Reolink P2P cameras outside of local network access. Reolink P2P Cameras The series is Reolink Network provided by IP It's a camera. The product contains the following multiple vulnerabilities. ‥ * Use of hard-coded encryption key (CWE-321) - CVE-2020-25173 ‥ * Sending important information in clear text (CWE-319) - CVE-2020-25169The expected impact depends on each vulnerability, but it may be affected as follows. - CVE-2020-25173 ‥ * Sensitive information such as camera footage is accessed by a remote third party - CVE-2020-25169
VAR-202101-1058 CVE-2021-1278 plural  Cisco SD-WAN  Buffer error vulnerability in the product CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco SD-WAN The product contains a buffer error vulnerability.Denial of service (DoS) It may be put into a state. Cisco SD-WAN vEdge is a router from Cisco of the United States. This device can provide basic WAN, security and multi-cloud functions for Cisco SD-WAN solutions. Cisco SD-WAN vManage is a software from Cisco (Cisco) that provides software-defined network functions. This software is a way of network virtualization. The symbolic link (symlink) creation function of Cisco SD-WAN software has a denial of service vulnerability. The vulnerability is caused by the program's failure to correctly verify and check the input to create a symbolic link. Attackers can create a symbolic link to the target file on a specific path. Use this vulnerability to overwrite arbitrary files owned by the root user on the affected system
VAR-202101-1040 CVE-2021-1299 plural  Cisco SD-WAN  Command injection vulnerabilities in the product CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco SD-WAN The product contains a command injection vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202101-0305 CVE-2020-25169 Reolink Made P2P Cameras Multiple vulnerabilities in the series CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The affected Reolink P2P products do not sufficiently protect data transferred between the local device and Reolink servers. This can allow an attacker to access sensitive information, such as camera feeds. Reolink P2P Cameras The series is Reolink Network provided by IP It's a camera. The product contains the following multiple vulnerabilities. ‥ * Use of hard-coded encryption key (CWE-321) - CVE-2020-25173 ‥ * Sending important information in clear text (CWE-319) - CVE-2020-25169The expected impact depends on each vulnerability, but it may be affected as follows. ‥ * A hard-coded encryption key can be stolen by a third party who can access the local network to break into the product from outside the local network
VAR-202101-1015 CVE-2021-1241 plural  Cisco SD-WAN  Buffer error vulnerability in the product CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco SD-WAN The product contains a buffer error vulnerability.Denial of service (DoS) It may be put into a state. Cisco SD-WAN vEdge is a router from Cisco of the United States. This device can provide basic WAN, security and multi-cloud functions for Cisco SD-WAN solutions. The VPN tunnel function of Cisco SD-WAN vEdge Router has a denial of service vulnerability. The vulnerability is caused by the program's failure to properly process malformed data packets. Remote attackers without authentication can send specially crafted data packets to the affected device. Exploit this vulnerability to cause the device to restart, resulting in a denial of service
VAR-202101-1064 CVE-2021-1233 Cisco SD-WAN  Software vulnerabilities CVSS V2: 4.9
CVSS V3: 4.4
Severity: MEDIUM
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to access sensitive information on an affected device. The vulnerability is due to insufficient input validation of requests that are sent to the iperf tool. An attacker could exploit this vulnerability by sending a crafted request to the iperf tool, which is included in Cisco SD-WAN Software. A successful exploit could allow the attacker to obtain any file from the filesystem of an affected device. Cisco SD-WAN There are unspecified vulnerabilities in the software.Information may be obtained. Cisco SD-WAN vEdge is a router from Cisco of the United States. This device can provide basic WAN, security and multi-cloud functions for Cisco SD-WAN solutions. Cisco SD-WAN vManage is a software provided by Cisco in the United States that provides software-defined network functions. This software is a way of network virtualization. Cisco SD-WAN Software versions prior to 18.4.3 have information disclosure vulnerabilities
VAR-202101-1039 CVE-2021-1298 plural  Cisco SD-WAN  Command injection vulnerabilities in the product CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco SD-WAN The product contains a command injection vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202101-1028 CVE-2021-1260 Multiple Cisco Product Command Injection Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory
VAR-202101-1044 CVE-2021-1261 Multiple Cisco SD-WAN Product injection vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory
VAR-202101-1041 CVE-2021-1300 plural  Cisco SD-WAN  Classic buffer overflow vulnerability in the product CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco SD-WAN The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco SD-WAN vEdge is a router from Cisco of the United States. This device can provide basic WAN, security and multi-cloud functions for Cisco SD-WAN solutions. Cisco SD-WAN vManage is a software from Cisco (Cisco) that provides software-defined network functions. This software is a way of network virtualization. Cisco SD-WAN Software has a buffer overflow vulnerability, which is caused by the program's failure to properly handle IP traffic. , And execute arbitrary code on the underlying operating system with root privileges
VAR-202101-0284 CVE-2020-19362 Vtiger CRM  Cross-site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Reflected XSS in Vtiger CRM v7.2.0 in vtigercrm/index.php? through the view parameter can result in an attacker performing malicious actions to users who open a maliciously crafted link or third-party web page. Vtiger CRM Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Vtiger CRM is a customer relationship management system (CRM) developed by Vtiger in the United States based on SugarCRM. The management system provides functions such as management, collection, and analysis of customer information. Vtiger CRM v7.2.0 has a cross-site scripting vulnerability, which stems from the lack of correct verification of client data in the WEB application. An attacker can use this vulnerability to execute client code
VAR-202101-1057 CVE-2021-1277 Cisco Data Center Network Manager  Vulnerability in Certificate Verification CVSS V2: 5.8
CVSS V3: 6.5
Severity: MEDIUM
Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could allow an attacker to spoof a trusted host or construct a man-in-the-middle attack to extract sensitive information or alter certain API requests. These vulnerabilities are due to insufficient certificate validation when establishing HTTPS requests with the affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Data Center Network Manager (DCNM) Contains a certificate validation vulnerability.Information may be obtained and information may be tampered with. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions