VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202011-1498 CVE-2020-26066 Cisco Systems  Cisco Catalyst SD-WAN Manager  In  XML  External entity vulnerabilities CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Systems Cisco Catalyst SD-WAN Manager for, XML There is a vulnerability in an external entity.Information may be obtained
VAR-202011-1496 CVE-2020-26073 Cisco Systems  Cisco Catalyst SD-WAN Manager  Past traversal vulnerability in CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the application data endpoints of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within requests to application programmatic interfaces (APIs). An attacker could exploit this vulnerability by sending malicious requests to an API within the affected application. A successful exploit could allow the attacker to conduct directory traversal attacks and gain access to sensitive information including credentials or user tokens.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Systems Cisco Catalyst SD-WAN Manager Exists in a past traversal vulnerability.Information may be obtained. This advisory is available at the following link:tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-traversal-hQh24tmk
VAR-202011-1494 CVE-2020-26074 Cisco Systems  Cisco Catalyst SD-WAN Manager  Unnecessary Privileged Execution Vulnerability in CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
A vulnerability in system file transfer functions of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to gain escalated privileges on the underlying operating system. The vulnerability is due to improper validation of path input to the system file transfer functions. An attacker could exploit this vulnerability by sending requests that contain specially crafted path variables to the vulnerable system. A successful exploit could allow the attacker to overwrite arbitrary files, allowing the attacker to modify the system in such a way that could allow the attacker to gain escalated privileges.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Systems Cisco Catalyst SD-WAN Manager contains an unnecessary privileged execution vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202011-1468 CVE-2020-5939 BIG-IP Virtual Edition  Vulnerability in CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.3, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, and 13.1.0-13.1.3.4, BIG-IP Virtual Edition (VE) systems on VMware, with an Intel-based 85299 Network Interface Controller (NIC) card and Single Root I/O Virtualization (SR-IOV) enabled on vSphere, may fail and leave the Traffic Management Microkernel (TMM) in a state where it cannot transmit traffic. BIG-IP Virtual Edition (VE) Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP VE has a security vulnerability due to enabling (SR-IOV) on vSphere, which may be in a state where it cannot transmit traffic. The following products and versions are affected: BIG-IP 16.0.0, 15.1.0, 14.1.0 to 14.1.2, 13.1.0 to 13.1.3
VAR-202011-1469 CVE-2020-5940 BIG-IP  Of the product  Traffic Management User Interface  Cross-site Scripting Vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.3, a stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Traffic Management User Interface (TMUI), also known as the BIG-IP Configuration utility. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP suffers from a cross-site scripting vulnerability, which arises from the ability of an authenticated attacker to store JavaScript, which will then be executed. When another authenticated user accesses the configurator, if the victim is an admin user with advanced shell (bash) access, an attacker can successfully exploit this vulnerability using remote code execution to completely compromise BIG-IP system. The following products and versions are affected: BIG-IP16.0.0, 15.1.0, 14.1.0 to 14.1.2, BIG-IQ 7.0.0, 6.0.0 to 6.1.0, 5.4.0, Traffix SDC 5.0.0 - 5.1.0
VAR-202011-1449 CVE-2020-5941 BIG-IP  Vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
On BIG-IP versions 16.0.0-16.0.0.1 and 15.1.0-15.1.0.5, using the RESOLV::lookup command within an iRule may cause the Traffic Management Microkernel (TMM) to generate a core file and restart. This issue occurs when data exceeding the maximum limit of a hostname passes to the RESOLV::lookup command. BIG-IP Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. The following products and versions are affected: BIG-IP 16.0.0, 15.1.0
VAR-202011-1583 No CVE ASUS Computer (Shanghai) Co., Ltd. RT-AC5300 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
ASUS Computer (Shanghai) Co., Ltd. business scope: research and development, manufacturing of notebook computers, computer motherboards, equipment and related software, mobile communication systems, etc. ASUS Computer (Shanghai) Co., Ltd. RT-AC5300 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202011-1584 No CVE Genexis Platinum-4410 and FHTC-201709142001 have command execution vulnerabilities CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Genexis is a leading European product and technology supplier dedicated to providing and improving the delivery of fiber optic broadband connections for communication operators and service providers. Genexis Platinum-4410 and FHTC-201709142001 have command execution vulnerabilities. Attackers can use the vulnerabilities to gain server permissions.
VAR-202011-1453 CVE-2020-5945 BIG-IP  Cross-site Scripting Vulnerability CVSS V2: 8.5
CVSS V3: 8.4
Severity: HIGH
In BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.7, undisclosed TMUI page contains a stored cross site scripting vulnerability (XSS). The issue allows a minor privilege escalation for resource admin to escalate to full admin. BIG-IP Contains a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 TMUI has a cross-site scripting vulnerability, which originates from undocumented TMUI pages, and an authenticated malicious user with resource administrator privileges can exploit this vulnerability to escalate their role to full administrator privileges and execute system commands. The following products and versions are affected: BIG-IP 16.0.0, 15.0.0 to 15.1.0, 14.1.0 to 14.1.2
VAR-202011-1451 CVE-2020-5943 BIG-IP  Vulnerability in cryptography CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
In versions 14.1.0-14.1.0.1 and 14.1.2.5-14.1.2.7, when a BIG-IP object is created or listed through the REST interface, the protected fields are obfuscated in the REST response, not protected via a SecureVault cryptogram as TMSH does. One example of protected fields is the GTM monitor password. BIG-IP Contains a cryptographic vulnerability.Information may be obtained. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. There is an information disclosure vulnerability in BIG-IP 14.x version
VAR-202011-1454 CVE-2020-5946 BIG-IP Advanced WAF  and  FPS  Vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
In BIG-IP Advanced WAF and FPS versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.7, under some circumstances, certain format client-side alerts sent to the BIG-IP virtual server configured with DataSafe may cause the Traffic Management Microkernel (TMM) to restart, resulting in a Denial-of-Service (DoS). BIG-IP Advanced WAF and FPS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. The following products and versions are affected: BIG-IP 16.0.0, 15.0.0 to 15.1.0, 14.1.0 to 14.1.2
VAR-202012-0100 CVE-2020-12516 WAGO Made of 750-88x and 750-352 Resource exhaustion vulnerability in series CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Older firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack. 750-88x and 750-352 The series is WAGO Provides PLC is. The product is exhausted (CWE-400) Service operation interruption due to (DoS) Vulnerability exists.Packets crafted by a remote third party HTTP(S) 80/443 Service operation interruption by receiving at the port (DoS) It may be in a state
VAR-202011-1465 CVE-2020-6015 Windows  for  Check Point Endpoint Security  Vulnerability in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Check Point Endpoint Security for Windows before E84.10 can reach denial of service during clean install of the client which will prevent the storage of service log files in non-standard locations
VAR-202011-1452 CVE-2020-5944 BIG-IQ  Vulnerability in CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
In BIG-IQ 7.1.0, accessing the DoS Summary events and DNS Overview pages in the BIG-IQ system interface returns an error message due to disabled Grafana reverse proxy in web service configuration. F5 has done further review of this vulnerability and has re-classified it as a defect. CVE-2020-5944 will continue to be referenced in F5 Security Advisory K57274211 and will not be assigned to other F5 vulnerabilities. BIG-IQ Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IQ Centralized Management is a set of software-based cloud management solutions from F5 Corporation of the United States. The solution supports the deployment of application delivery and network services across public and private clouds, traditional data centers and hybrid environments
VAR-202011-1450 CVE-2020-5942 BIG-IP PEM  Vulnerability in CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
In BIG-IP PEM versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when processing Capabilities-Exchange-Answer (CEA) packets with certain attributes from the Policy and Charging Rules Function (PCRF) server, the Traffic Management Microkernel (TMM) may generate a core file and restart. BIG-IP PEM Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. The following products and versions are affected: BIG-IP 16.0.0, 15.1.0, 14.1.0 to 14.1.2, 13.1.0 to 13.1.3, 12.1.0 to 12.1.5, 11.6.1 to 11.6.5
VAR-202011-1585 No CVE ASUS Computer (Shanghai) Co., Ltd. RT-AC5300 has a binary vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
ASUS Computer (Shanghai) Co., Ltd. business scope: research and development, manufacturing of notebook computers, computer motherboards, equipment and related software, mobile communication systems, etc. ASUS Computer (Shanghai) Co., Ltd. RT-AC5300 has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202011-1337 CVE-2020-9861 Linux  for  Swift  Stack Overflow Vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A stack overflow issue existed in Swift for Linux. The issue was addressed with improved input validation for dealing with deeply nested malicious JSON input. There is a security vulnerability in Linux Swift
VAR-202011-1395 CVE-2020-3693 plural  Qualcomm  Buffer error vulnerability in the product CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
u'Use out of range pointer issue can occur due to incorrect buffer range check during the execution of qseecom.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8098, Bitra, MSM8909W, MSM8996AU, Nicobar, QCM2150, QCS605, Saipan, SDM429W, SDX20, SM6150, SM8150, SM8250, SXR2130. plural Qualcomm The product contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Qualcomm SDX20 and SXR2130 are both products of Qualcomm (Qualcomm). SDX20 is a modem. SXR2130 is a central processing unit (CPU) product. Many Qualcomm products have security vulnerabilities, which can cause memory corruption if unknown input is made
VAR-202011-1397 CVE-2020-3696 plural  Qualcomm  Product Free Memory Usage Vulnerability CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
u'Use after free while installing new security rule in ipcrtr as old one is deleted and this rule could still be in use for checking security permission for particular process' in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ6018, IPQ8064, IPQ8074, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8996AU, QCA4531, QCA6574AU, QCA9531, QCM2150, QCS605, SDM429W, SDX20, SDX24. plural Qualcomm The product contains a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. MSM8996AU is a central processing unit (CPU) product. QCA6574AU is a central processing unit (CPU) product. SDX24 is a modem. SDX20 is a modem. APQ8017 is a central processing unit (CPU) product. APQ8053 is a central processing unit (CPU) product. QCS605 is a central processing unit (CPU) product. Qualcomm APQ8009 is a central processing unit (CPU) product. MSM8905 is a central processing unit (CPU) product. MSM8909 is a central processing unit (CPU) product. IPQ6018 is a central processing unit (CPU) product. Wire etc. are the products of individual developers. Wire is a chat software. Many products have security vulnerabilities, which may cause some software to be used for free
VAR-202011-1239 CVE-2020-3639 plural  Qualcomm  Product index validation vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
u'When a non standard SIP sigcomp message is received from the network, then there may be chances of using more UDVM cycle or memory overflow' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8017, APQ8037, APQ8053, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCM4290, QCM6125, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, QSM8350, SA415M, SA6145P, SA6150P, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8350, SM8350P, SXR1120, SXR1130. plural Qualcomm The product contains a vulnerability in array index validation.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state