VARIoT IoT vulnerabilities database
| VAR-202010-0969 | CVE-2020-27658 | Synology Router Manager Improper Permission Assignment Vulnerability in Critical Resources |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Synology Router Manager (SRM) before 1.2.4-8081 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. Synology Router Manager (SRM) Is vulnerable to an improperly assigned permission for critical resources.Information may be obtained and information may be tampered with. Synology Router Manager (SRM) is a software for configuring and managing Synology routers developed by Synology, Taiwan. Synology Router Manager (SRM) versions prior to 1.2.4-8081 have a security vulnerability. The vulnerability is caused by the HTTPOnly flag in the Set-Cookie header that does not contain a session cookie
| VAR-202010-0968 | CVE-2020-27657 | Synology Router Manager Vulnerability in plaintext transmission of important information in |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
Cleartext transmission of sensitive information vulnerability in DDNS in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to eavesdrop authentication information of DNSExit via unspecified vectors. Synology Router Manager (SRM) is a software for configuring and managing Synology routers developed by Synology, Taiwan
| VAR-202011-1464 | CVE-2020-6014 | Windows for Check Point Endpoint Security Client Untrusted search path vulnerabilities in |
CVSS V2: 4.4 CVSS V3: 6.5 Severity: MEDIUM |
Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate. Check Point Endpoint Security Client is a terminal security protection software from Israel Check Point Company
| VAR-202010-0967 | CVE-2020-27656 | Synology DiskStation Manager Information disclosure vulnerability |
CVSS V2: 4.3 CVSS V3: 3.7 Severity: LOW |
Cleartext transmission of sensitive information vulnerability in DDNS in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to eavesdrop authentication information of DNSExit via unspecified vectors. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information. Synology Router Manager (SRM) versions prior to 1.2.4-8081 have a security vulnerability
| VAR-202010-0963 | CVE-2020-27652 | Synology DiskStation Manager Encryption problem vulnerability |
CVSS V2: 5.1 CVSS V3: 8.3 Severity: HIGH |
Algorithm downgrade vulnerability in QuickConnect in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information. Synology DiskStation Manager (DSM) prior to version 6.2.3-25426-2 has a security vulnerability. The vulnerability originates from QuickConnect
| VAR-202010-0961 | CVE-2020-27650 | Synology DiskStation Manager Vulnerability regarding lack of encryption of critical data in |
CVSS V2: 4.3 CVSS V3: 3.7 Severity: LOW |
Synology DiskStation Manager (DSM) before 6.2.3-25426-2 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session. Synology DiskStation Manager (DSM) There is a vulnerability in the lack of encryption of critical data.Information may be obtained. Synology DiskStation Manager (DSM) is a product of China Taiwan (DSM) and others are products of China Taiwan Synology Technology (Synology) company. Synology DiskStation Manager is an operating system for network storage servers (NAS). HTTPS (Hypertext Transfer Protocol Secure, hypertext transfer security protocol) and so on are all products. HTTPS is a network security transmission protocol, and the Debian project apt, etc. are all products of the Debian project (Debian project) cooperative organization. apt is a command-line package manager
| VAR-202010-0959 | CVE-2020-27648 | Synology DiskStation Manager Vulnerability in Certificate Verification |
CVSS V2: 6.8 CVSS V3: 9.0 Severity: CRITICAL |
Improper certificate validation vulnerability in OpenVPN client in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information. Synology DiskStation Manager (DSM) versions prior to 6.2.3-25426-2 have a security vulnerability
| VAR-202010-1490 | CVE-2020-5938 | BIG-IP Vulnerability in cryptography |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
On BIG-IP 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when negotiating IPSec tunnels with configured, authenticated peers, the peer may negotiate a different key length than the BIG-IP configuration would otherwise allow. BIG-IP Contains a cryptographic vulnerability.Information may be obtained. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. There is a security vulnerability in F5 BIG-IP. Attackers can exploit this vulnerability to bypass data access restrictions and obtain sensitive information through the small IPsec key length
| VAR-202010-0381 | CVE-2020-16262 | Winston Vulnerability in improper permission assignment for critical resources on devices |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Winston 1.5.4 devices have a local www-data user that is overly permissioned, resulting in root privilege escalation. Winston A device contains a vulnerability related to improper permission assignment for critical resources.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Winston Privacy is a kind of hardware VPN equipment of Winston Privacy Company of the United States. No detailed vulnerability details are currently provided
| VAR-202010-1485 | CVE-2020-5933 | BIG-IP Vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
On versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, when a BIG-IP system that has a virtual server configured with an HTTP compression profile processes compressed HTTP message payloads that require deflation, a Slowloris-style attack can trigger an out-of-memory condition on the BIG-IP system. BIG-IP Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP has a security vulnerability that can be exploited by an attacker to create a memory leak through HTTP compressed configuration files to trigger a denial of service
| VAR-202010-1487 | CVE-2020-5935 | plural BIG-IP Product vulnerabilities |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
On BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, FPS, GTM, Link Controller, PEM) versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when handling MQTT traffic through a BIG-IP virtual server associated with an MQTT profile and an iRule performing manipulations on that traffic, TMM may produce a core file. plural BIG-IP The product contains unspecified vulnerabilities.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. There is a security vulnerability in F5 BIG-IP, which can be exploited by an attacker to trigger a fatal error through the MQTT iRule to trigger a denial of service
| VAR-202010-1367 | CVE-2020-4864 | IBM Resilient SOAR Spoofing Authentication Bypass Vulnerability in |
CVSS V2: 3.3 CVSS V3: 4.3 Severity: MEDIUM |
IBM Resilient SOAR V38.0 could allow an attacker on the internal net work to provide the server with a spoofed source IP address. IBM X-Force ID: 190567. IBM Resilient SOAR Contains a spoofing authentication evasion vulnerability. Vendor exploits this vulnerability IBM X-Force ID: 190567 It is published as.Information may be tampered with
| VAR-202010-1086 | CVE-2020-5931 | BIG-IP Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, Virtual servers with a OneConnect profile may incorrectly handle WebSockets related HTTP response headers, causing TMM to restart. BIG-IP Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP has a security vulnerability that can be exploited by an attacker to trigger a fatal error through the TMM OneConnect configuration file to trigger a denial of service
| VAR-202010-1489 | CVE-2020-5937 | BIG-IP AFM Vulnerability in |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP AFM 15.1.0-15.1.0.5, the Traffic Management Microkernel (TMM) may produce a core file while processing layer 4 (L4) behavioral denial-of-service (DoS) traffic. BIG-IP AFM Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP AFM is an advanced firewall product used to protect against DDos attacks from F5 Corporation of the United States. There is a security vulnerability in F5 BIG-IP AFM, which can be exploited by an attacker to trigger a fatal error through L4 Behavioral behavior, thereby triggering a denial of service
| VAR-202010-1001 | CVE-2020-27980 | Genexis Platinum-4410 cross-site scripting vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Genexis Platinum-4410 P4410-V2-1.28 devices allow stored XSS in the WLAN SSID parameter. This could allow an attacker to perform malicious actions in which the XSS popup will affect all privileged users. Genexis Platinum-4410 Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Genexis Platinum-4410 is a wireless router of British Genexis company.
Genexis Platinum-4410 P4410-V2-1.28 has a cross-site scripting vulnerability
| VAR-202010-1488 | CVE-2020-5936 | BIG-IP LTM Resource Depletion Vulnerability |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP LTM 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, and 12.1.0-12.1.5.1, the Traffic Management Microkernel (TMM) process may consume excessive resources when processing SSL traffic and client authentication are enabled on the client SSL profile. BIG-IP LTM Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP LTM has a security vulnerability that can be exploited by an attacker to trigger an overload through client-side SSL profile authentication to trigger a denial of service
| VAR-202010-1486 | CVE-2020-5934 | BIG-IP APM Vulnerability in |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
On BIG-IP APM 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when multiple HTTP requests from the same client to configured SAML Single Logout (SLO) URL are passing through a TCP Keep-Alive connection, traffic to TMM can be disrupted. BIG-IP APM Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP APM is a set of access and security solutions from F5 Corporation of the United States. The product provides unified access to business-critical applications and networks. A security vulnerability exists in F5 BIG-IP APM that could allow an attacker to trigger a denial of service by triggering a fatal error on a single logout
| VAR-202010-1197 | CVE-2020-5145 | SonicWall Global VPN client Vulnerability in Uncontrolled Search Path Elements |
CVSS V2: 6.9 CVSS V3: 8.6 Severity: HIGH |
SonicWall Global VPN client version 4.10.4.0314 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to remote code execution in the target system. SonicWall Global VPN client There is a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SonicWall Global VPN client is a Vpn software developed by SonicWall in the United States and used in conjunction with SonicWALL firewalls. The software enables remote employees and suppliers to access the company's network
| VAR-202010-1196 | CVE-2020-5144 | SonicWall Global VPN client Untrusted search path vulnerabilities in |
CVSS V2: 6.9 CVSS V3: 7.8 Severity: HIGH |
SonicWall Global VPN client version 4.10.4.0314 and earlier allows unprivileged windows user to elevate privileges to SYSTEM through loaded process hijacking vulnerability. SonicWall Global VPN client Exists in an untrusted search path vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SonicWall Global VPN client is a Vpn software developed by SonicWall in the United States and used in conjunction with SonicWALL firewalls. The software enables remote employees and suppliers to access the company's network
| VAR-202010-1087 | CVE-2020-5932 | BIG-IP ASM Cross-site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
On BIG-IP ASM 15.1.0-15.1.0.5, a cross-site scripting (XSS) vulnerability exists in the BIG-IP ASM Configuration utility response and blocking pages. An authenticated user with administrative privileges can specify a response page with any content, including JavaScript code that will be executed when preview is opened. F5 BIG-IP ASM is a Web Application Firewall (WAF) of F5 Corporation in the United States, which provides secure remote access, protects emails, simplifies Web access control, and enhances network and application performance