VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202010-0969 CVE-2020-27658 Synology Router Manager  Improper Permission Assignment Vulnerability in Critical Resources CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Synology Router Manager (SRM) before 1.2.4-8081 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. Synology Router Manager (SRM) Is vulnerable to an improperly assigned permission for critical resources.Information may be obtained and information may be tampered with. Synology Router Manager (SRM) is a software for configuring and managing Synology routers developed by Synology, Taiwan. Synology Router Manager (SRM) versions prior to 1.2.4-8081 have a security vulnerability. The vulnerability is caused by the HTTPOnly flag in the Set-Cookie header that does not contain a session cookie
VAR-202010-0968 CVE-2020-27657 Synology Router Manager  Vulnerability in plaintext transmission of important information in CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
Cleartext transmission of sensitive information vulnerability in DDNS in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to eavesdrop authentication information of DNSExit via unspecified vectors. Synology Router Manager (SRM) is a software for configuring and managing Synology routers developed by Synology, Taiwan
VAR-202011-1464 CVE-2020-6014 Windows  for  Check Point Endpoint Security Client  Untrusted search path vulnerabilities in CVSS V2: 4.4
CVSS V3: 6.5
Severity: MEDIUM
Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate. Check Point Endpoint Security Client is a terminal security protection software from Israel Check Point Company
VAR-202010-0967 CVE-2020-27656 Synology DiskStation Manager Information disclosure vulnerability CVSS V2: 4.3
CVSS V3: 3.7
Severity: LOW
Cleartext transmission of sensitive information vulnerability in DDNS in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to eavesdrop authentication information of DNSExit via unspecified vectors. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information. Synology Router Manager (SRM) versions prior to 1.2.4-8081 have a security vulnerability
VAR-202010-0963 CVE-2020-27652 Synology DiskStation Manager Encryption problem vulnerability CVSS V2: 5.1
CVSS V3: 8.3
Severity: HIGH
Algorithm downgrade vulnerability in QuickConnect in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information. Synology DiskStation Manager (DSM) prior to version 6.2.3-25426-2 has a security vulnerability. The vulnerability originates from QuickConnect
VAR-202010-0961 CVE-2020-27650 Synology DiskStation Manager  Vulnerability regarding lack of encryption of critical data in CVSS V2: 4.3
CVSS V3: 3.7
Severity: LOW
Synology DiskStation Manager (DSM) before 6.2.3-25426-2 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session. Synology DiskStation Manager (DSM) There is a vulnerability in the lack of encryption of critical data.Information may be obtained. Synology DiskStation Manager (DSM) is a product of China Taiwan (DSM) and others are products of China Taiwan Synology Technology (Synology) company. Synology DiskStation Manager is an operating system for network storage servers (NAS). HTTPS (Hypertext Transfer Protocol Secure, hypertext transfer security protocol) and so on are all products. HTTPS is a network security transmission protocol, and the Debian project apt, etc. are all products of the Debian project (Debian project) cooperative organization. apt is a command-line package manager
VAR-202010-0959 CVE-2020-27648 Synology DiskStation Manager  Vulnerability in Certificate Verification CVSS V2: 6.8
CVSS V3: 9.0
Severity: CRITICAL
Improper certificate validation vulnerability in OpenVPN client in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. Synology DiskStation Manager (DSM) is an operating system for network storage servers (NAS) developed by Synology, Taiwan. The operating system can manage data, documents, photos, music and other information. Synology DiskStation Manager (DSM) versions prior to 6.2.3-25426-2 have a security vulnerability
VAR-202010-1490 CVE-2020-5938 BIG-IP  Vulnerability in cryptography CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
On BIG-IP 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when negotiating IPSec tunnels with configured, authenticated peers, the peer may negotiate a different key length than the BIG-IP configuration would otherwise allow. BIG-IP Contains a cryptographic vulnerability.Information may be obtained. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. There is a security vulnerability in F5 BIG-IP. Attackers can exploit this vulnerability to bypass data access restrictions and obtain sensitive information through the small IPsec key length
VAR-202010-0381 CVE-2020-16262 Winston  Vulnerability in improper permission assignment for critical resources on devices CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Winston 1.5.4 devices have a local www-data user that is overly permissioned, resulting in root privilege escalation. Winston A device contains a vulnerability related to improper permission assignment for critical resources.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Winston Privacy is a kind of hardware VPN equipment of Winston Privacy Company of the United States. No detailed vulnerability details are currently provided
VAR-202010-1485 CVE-2020-5933 BIG-IP  Vulnerability in CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
On versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, when a BIG-IP system that has a virtual server configured with an HTTP compression profile processes compressed HTTP message payloads that require deflation, a Slowloris-style attack can trigger an out-of-memory condition on the BIG-IP system. BIG-IP Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP has a security vulnerability that can be exploited by an attacker to create a memory leak through HTTP compressed configuration files to trigger a denial of service
VAR-202010-1487 CVE-2020-5935 plural  BIG-IP  Product vulnerabilities CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
On BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, FPS, GTM, Link Controller, PEM) versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when handling MQTT traffic through a BIG-IP virtual server associated with an MQTT profile and an iRule performing manipulations on that traffic, TMM may produce a core file. plural BIG-IP The product contains unspecified vulnerabilities.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. There is a security vulnerability in F5 BIG-IP, which can be exploited by an attacker to trigger a fatal error through the MQTT iRule to trigger a denial of service
VAR-202010-1367 CVE-2020-4864 IBM Resilient SOAR Spoofing Authentication Bypass Vulnerability in CVSS V2: 3.3
CVSS V3: 4.3
Severity: MEDIUM
IBM Resilient SOAR V38.0 could allow an attacker on the internal net work to provide the server with a spoofed source IP address. IBM X-Force ID: 190567. IBM Resilient SOAR Contains a spoofing authentication evasion vulnerability. Vendor exploits this vulnerability IBM X-Force ID: 190567 It is published as.Information may be tampered with
VAR-202010-1086 CVE-2020-5931 BIG-IP  Vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
On BIG-IP 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, Virtual servers with a OneConnect profile may incorrectly handle WebSockets related HTTP response headers, causing TMM to restart. BIG-IP Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP has a security vulnerability that can be exploited by an attacker to trigger a fatal error through the TMM OneConnect configuration file to trigger a denial of service
VAR-202010-1489 CVE-2020-5937 BIG-IP AFM  Vulnerability in CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
On BIG-IP AFM 15.1.0-15.1.0.5, the Traffic Management Microkernel (TMM) may produce a core file while processing layer 4 (L4) behavioral denial-of-service (DoS) traffic. BIG-IP AFM Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP AFM is an advanced firewall product used to protect against DDos attacks from F5 Corporation of the United States. There is a security vulnerability in F5 BIG-IP AFM, which can be exploited by an attacker to trigger a fatal error through L4 Behavioral behavior, thereby triggering a denial of service
VAR-202010-1001 CVE-2020-27980 Genexis Platinum-4410 cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Genexis Platinum-4410 P4410-V2-1.28 devices allow stored XSS in the WLAN SSID parameter. This could allow an attacker to perform malicious actions in which the XSS popup will affect all privileged users. Genexis Platinum-4410 Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Genexis Platinum-4410 is a wireless router of British Genexis company. Genexis Platinum-4410 P4410-V2-1.28 has a cross-site scripting vulnerability
VAR-202010-1488 CVE-2020-5936 BIG-IP LTM  Resource Depletion Vulnerability CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
On BIG-IP LTM 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, and 12.1.0-12.1.5.1, the Traffic Management Microkernel (TMM) process may consume excessive resources when processing SSL traffic and client authentication are enabled on the client SSL profile. BIG-IP LTM Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP LTM has a security vulnerability that can be exploited by an attacker to trigger an overload through client-side SSL profile authentication to trigger a denial of service
VAR-202010-1486 CVE-2020-5934 BIG-IP APM  Vulnerability in CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
On BIG-IP APM 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when multiple HTTP requests from the same client to configured SAML Single Logout (SLO) URL are passing through a TCP Keep-Alive connection, traffic to TMM can be disrupted. BIG-IP APM Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP APM is a set of access and security solutions from F5 Corporation of the United States. The product provides unified access to business-critical applications and networks. A security vulnerability exists in F5 BIG-IP APM that could allow an attacker to trigger a denial of service by triggering a fatal error on a single logout
VAR-202010-1197 CVE-2020-5145 SonicWall Global VPN client  Vulnerability in Uncontrolled Search Path Elements CVSS V2: 6.9
CVSS V3: 8.6
Severity: HIGH
SonicWall Global VPN client version 4.10.4.0314 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to remote code execution in the target system. SonicWall Global VPN client There is a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SonicWall Global VPN client is a Vpn software developed by SonicWall in the United States and used in conjunction with SonicWALL firewalls. The software enables remote employees and suppliers to access the company's network
VAR-202010-1196 CVE-2020-5144 SonicWall Global VPN client  Untrusted search path vulnerabilities in CVSS V2: 6.9
CVSS V3: 7.8
Severity: HIGH
SonicWall Global VPN client version 4.10.4.0314 and earlier allows unprivileged windows user to elevate privileges to SYSTEM through loaded process hijacking vulnerability. SonicWall Global VPN client Exists in an untrusted search path vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SonicWall Global VPN client is a Vpn software developed by SonicWall in the United States and used in conjunction with SonicWALL firewalls. The software enables remote employees and suppliers to access the company's network
VAR-202010-1087 CVE-2020-5932 BIG-IP ASM  Cross-site Scripting Vulnerability CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
On BIG-IP ASM 15.1.0-15.1.0.5, a cross-site scripting (XSS) vulnerability exists in the BIG-IP ASM Configuration utility response and blocking pages. An authenticated user with administrative privileges can specify a response page with any content, including JavaScript code that will be executed when preview is opened. F5 BIG-IP ASM is a Web Application Firewall (WAF) of F5 Corporation in the United States, which provides secure remote access, protects emails, simplifies Web access control, and enhances network and application performance