VARIoT IoT vulnerabilities database
| VAR-202011-1498 | CVE-2020-26066 | Cisco Systems Cisco Catalyst SD-WAN Manager In XML External entity vulnerabilities |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system.
The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Systems Cisco Catalyst SD-WAN Manager for, XML There is a vulnerability in an external entity.Information may be obtained
| VAR-202011-1496 | CVE-2020-26073 | Cisco Systems Cisco Catalyst SD-WAN Manager Past traversal vulnerability in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the application data endpoints of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to gain access to sensitive information.
The vulnerability is due to improper validation of directory traversal character sequences within requests to application programmatic interfaces (APIs). An attacker could exploit this vulnerability by sending malicious requests to an API within the affected application. A successful exploit could allow the attacker to conduct directory traversal attacks and gain access to sensitive information including credentials or user tokens.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Systems Cisco Catalyst SD-WAN Manager Exists in a past traversal vulnerability.Information may be obtained.
This advisory is available at the following link:tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-traversal-hQh24tmk
| VAR-202011-1494 | CVE-2020-26074 | Cisco Systems Cisco Catalyst SD-WAN Manager Unnecessary Privileged Execution Vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
A vulnerability in system file transfer functions of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to gain escalated privileges on the underlying operating system.
The vulnerability is due to improper validation of path input to the system file transfer functions. An attacker could exploit this vulnerability by sending requests that contain specially crafted path variables to the vulnerable system. A successful exploit could allow the attacker to overwrite arbitrary files, allowing the attacker to modify the system in such a way that could allow the attacker to gain escalated privileges.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Systems Cisco Catalyst SD-WAN Manager contains an unnecessary privileged execution vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202011-1468 | CVE-2020-5939 | BIG-IP Virtual Edition Vulnerability in |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.3, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, and 13.1.0-13.1.3.4, BIG-IP Virtual Edition (VE) systems on VMware, with an Intel-based 85299 Network Interface Controller (NIC) card and Single Root I/O Virtualization (SR-IOV) enabled on vSphere, may fail and leave the Traffic Management Microkernel (TMM) in a state where it cannot transmit traffic. BIG-IP Virtual Edition (VE) Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP VE has a security vulnerability due to enabling (SR-IOV) on vSphere, which may be in a state where it cannot transmit traffic. The following products and versions are affected: BIG-IP 16.0.0, 15.1.0, 14.1.0 to 14.1.2, 13.1.0 to 13.1.3
| VAR-202011-1469 | CVE-2020-5940 | BIG-IP Of the product Traffic Management User Interface Cross-site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.3, a stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Traffic Management User Interface (TMUI), also known as the BIG-IP Configuration utility. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP suffers from a cross-site scripting vulnerability, which arises from the ability of an authenticated attacker to store JavaScript, which will then be executed. When another authenticated user accesses the configurator, if the victim is an admin user with advanced shell (bash) access, an attacker can successfully exploit this vulnerability using remote code execution to completely compromise BIG-IP system. The following products and versions are affected: BIG-IP16.0.0, 15.1.0, 14.1.0 to 14.1.2, BIG-IQ 7.0.0, 6.0.0 to 6.1.0, 5.4.0, Traffix SDC 5.0.0 - 5.1.0
| VAR-202011-1449 | CVE-2020-5941 | BIG-IP Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP versions 16.0.0-16.0.0.1 and 15.1.0-15.1.0.5, using the RESOLV::lookup command within an iRule may cause the Traffic Management Microkernel (TMM) to generate a core file and restart. This issue occurs when data exceeding the maximum limit of a hostname passes to the RESOLV::lookup command. BIG-IP Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. The following products and versions are affected: BIG-IP 16.0.0, 15.1.0
| VAR-202011-1583 | No CVE | ASUS Computer (Shanghai) Co., Ltd. RT-AC5300 has a binary vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
ASUS Computer (Shanghai) Co., Ltd. business scope: research and development, manufacturing of notebook computers, computer motherboards, equipment and related software, mobile communication systems, etc.
ASUS Computer (Shanghai) Co., Ltd. RT-AC5300 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
| VAR-202011-1584 | No CVE | Genexis Platinum-4410 and FHTC-201709142001 have command execution vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Genexis is a leading European product and technology supplier dedicated to providing and improving the delivery of fiber optic broadband connections for communication operators and service providers.
Genexis Platinum-4410 and FHTC-201709142001 have command execution vulnerabilities. Attackers can use the vulnerabilities to gain server permissions.
| VAR-202011-1453 | CVE-2020-5945 | BIG-IP Cross-site Scripting Vulnerability |
CVSS V2: 8.5 CVSS V3: 8.4 Severity: HIGH |
In BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.7, undisclosed TMUI page contains a stored cross site scripting vulnerability (XSS). The issue allows a minor privilege escalation for resource admin to escalate to full admin. BIG-IP Contains a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 TMUI has a cross-site scripting vulnerability, which originates from undocumented TMUI pages, and an authenticated malicious user with resource administrator privileges can exploit this vulnerability to escalate their role to full administrator privileges and execute system commands. The following products and versions are affected: BIG-IP 16.0.0, 15.0.0 to 15.1.0, 14.1.0 to 14.1.2
| VAR-202011-1451 | CVE-2020-5943 | BIG-IP Vulnerability in cryptography |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
In versions 14.1.0-14.1.0.1 and 14.1.2.5-14.1.2.7, when a BIG-IP object is created or listed through the REST interface, the protected fields are obfuscated in the REST response, not protected via a SecureVault cryptogram as TMSH does. One example of protected fields is the GTM monitor password. BIG-IP Contains a cryptographic vulnerability.Information may be obtained. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. There is an information disclosure vulnerability in BIG-IP 14.x version
| VAR-202011-1454 | CVE-2020-5946 | BIG-IP Advanced WAF and FPS Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In BIG-IP Advanced WAF and FPS versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.7, under some circumstances, certain format client-side alerts sent to the BIG-IP virtual server configured with DataSafe may cause the Traffic Management Microkernel (TMM) to restart, resulting in a Denial-of-Service (DoS). BIG-IP Advanced WAF and FPS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. The following products and versions are affected: BIG-IP 16.0.0, 15.0.0 to 15.1.0, 14.1.0 to 14.1.2
| VAR-202012-0100 | CVE-2020-12516 | WAGO Made of 750-88x and 750-352 Resource exhaustion vulnerability in series |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Older firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack. 750-88x and 750-352 The series is WAGO Provides PLC is. The product is exhausted (CWE-400) Service operation interruption due to (DoS) Vulnerability exists.Packets crafted by a remote third party HTTP(S) 80/443 Service operation interruption by receiving at the port (DoS) It may be in a state
| VAR-202011-1465 | CVE-2020-6015 | Windows for Check Point Endpoint Security Vulnerability in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Check Point Endpoint Security for Windows before E84.10 can reach denial of service during clean install of the client which will prevent the storage of service log files in non-standard locations
| VAR-202011-1452 | CVE-2020-5944 | BIG-IQ Vulnerability in |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
In BIG-IQ 7.1.0, accessing the DoS Summary events and DNS Overview pages in the BIG-IQ system interface returns an error message due to disabled Grafana reverse proxy in web service configuration. F5 has done further review of this vulnerability and has re-classified it as a defect. CVE-2020-5944 will continue to be referenced in F5 Security Advisory K57274211 and will not be assigned to other F5 vulnerabilities. BIG-IQ Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IQ Centralized Management is a set of software-based cloud management solutions from F5 Corporation of the United States. The solution supports the deployment of application delivery and network services across public and private clouds, traditional data centers and hybrid environments
| VAR-202011-1450 | CVE-2020-5942 | BIG-IP PEM Vulnerability in |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
In BIG-IP PEM versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when processing Capabilities-Exchange-Answer (CEA) packets with certain attributes from the Policy and Charging Rules Function (PCRF) server, the Traffic Management Microkernel (TMM) may generate a core file and restart. BIG-IP PEM Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. The following products and versions are affected: BIG-IP 16.0.0, 15.1.0, 14.1.0 to 14.1.2, 13.1.0 to 13.1.3, 12.1.0 to 12.1.5, 11.6.1 to 11.6.5
| VAR-202011-1585 | No CVE | ASUS Computer (Shanghai) Co., Ltd. RT-AC5300 has a binary vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
ASUS Computer (Shanghai) Co., Ltd. business scope: research and development, manufacturing of notebook computers, computer motherboards, equipment and related software, mobile communication systems, etc.
ASUS Computer (Shanghai) Co., Ltd. RT-AC5300 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
| VAR-202011-1337 | CVE-2020-9861 | Linux for Swift Stack Overflow Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A stack overflow issue existed in Swift for Linux. The issue was addressed with improved input validation for dealing with deeply nested malicious JSON input. There is a security vulnerability in Linux Swift
| VAR-202011-1395 | CVE-2020-3693 | plural Qualcomm Buffer error vulnerability in the product |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
u'Use out of range pointer issue can occur due to incorrect buffer range check during the execution of qseecom.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8098, Bitra, MSM8909W, MSM8996AU, Nicobar, QCM2150, QCS605, Saipan, SDM429W, SDX20, SM6150, SM8150, SM8250, SXR2130. plural Qualcomm The product contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Qualcomm SDX20 and SXR2130 are both products of Qualcomm (Qualcomm). SDX20 is a modem. SXR2130 is a central processing unit (CPU) product.
Many Qualcomm products have security vulnerabilities, which can cause memory corruption if unknown input is made
| VAR-202011-1397 | CVE-2020-3696 | plural Qualcomm Product Free Memory Usage Vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
u'Use after free while installing new security rule in ipcrtr as old one is deleted and this rule could still be in use for checking security permission for particular process' in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ6018, IPQ8064, IPQ8074, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8996AU, QCA4531, QCA6574AU, QCA9531, QCM2150, QCS605, SDM429W, SDX20, SDX24. plural Qualcomm The product contains a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. MSM8996AU is a central processing unit (CPU) product. QCA6574AU is a central processing unit (CPU) product. SDX24 is a modem. SDX20 is a modem. APQ8017 is a central processing unit (CPU) product. APQ8053 is a central processing unit (CPU) product. QCS605 is a central processing unit (CPU) product. Qualcomm APQ8009 is a central processing unit (CPU) product. MSM8905 is a central processing unit (CPU) product. MSM8909 is a central processing unit (CPU) product. IPQ6018 is a central processing unit (CPU) product. Wire etc. are the products of individual developers. Wire is a chat software.
Many products have security vulnerabilities, which may cause some software to be used for free
| VAR-202011-1239 | CVE-2020-3639 | plural Qualcomm Product index validation vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
u'When a non standard SIP sigcomp message is received from the network, then there may be chances of using more UDVM cycle or memory overflow' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8017, APQ8037, APQ8053, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCM4290, QCM6125, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, QSM8350, SA415M, SA6145P, SA6150P, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8350, SM8350P, SXR1120, SXR1130. plural Qualcomm The product contains a vulnerability in array index validation.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state