VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202010-1248 CVE-2020-9929 macOS Memory Corruption Vulnerability in CVSS V2: 6.6
CVSS V3: 7.1
Severity: HIGH
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to cause unexpected system termination or read kernel memory. Apple OS X is a set of dedicated operating systems developed by Apple for Mac computers
VAR-202010-1247 CVE-2020-9928 macOS Multiple memory corruption vulnerabilities in CVSS V2: 9.3
CVSS V3: 7.8
Severity: HIGH
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.6. An application may be able to execute arbitrary code with kernel privileges. Apple OS X is a set of dedicated operating systems developed by Apple for Mac computers
VAR-202010-1244 CVE-2020-9924 macOS Logic vulnerabilities in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A logic issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.6. A remote attacker may be able to cause a denial of service. macOS Has a logic vulnerability due to poor state management.Service operation disrupted by a remote attacker (DoS) It may be put into a state. Apple OS X is a set of dedicated operating systems developed by Apple for Mac computers
VAR-202010-1241 CVE-2020-9920 plural Apple Product path handling vulnerability CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
A path handling issue was addressed with improved validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, watchOS 6.2.8. A malicious mail server may overwrite arbitrary mail files. Apple OS X is a set of dedicated operating systems developed by Apple for Mac computers. A security vulnerability exists in OS X Mail that could allow messages to be overwritten
VAR-202010-1227 CVE-2020-9906 Apple macOS Catalina Buffer error vulnerability CVSS V2: 9.4
CVSS V3: 9.1
Severity: CRITICAL
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, watchOS 6.2.8. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple watchOS is a smart watch operating system. Apple iPadOS is an operating system for iPad tablets
VAR-202010-1585 CVE-2020-25168 plural  B. Braun Melsungen  Multiple vulnerabilities in product CVSS V2: 2.1
CVSS V3: 3.3
Severity: LOW
Hard-coded credentials in the B. Braun Melsungen AG SpaceCom Version L81/U61 and earlier, and the Data module compactplus Versions A10 and A11 enable attackers with command line access to access the device’s Wi-Fi module. B.Braun Melsungen Multiple products provided by Co., Ltd. contain multiple vulnerabilities listed below. * Reflected cross-site scripting (CWE-79) - CVE-2020-25158 It was * Open redirect (CWE-601) - CVE-2020-25154 It was * XPATH injection (CWE-643) - CVE-2020-25162 It was * Session immobilization (CWE-384) - CVE-2020-25152 It was * Salt Using hash functions without (CWE-759) - CVE-2020-25164 It was * relative path traversal (CWE-23) - CVE-2020-25150 It was * Improper verification of digital signatures (CWE-347) - CVE-2020-25166 It was * Improper authority management (CWE-269) - CVE-2020-16238 It was * Use hard-coded credentials (CWE-798) - CVE-2020-25168 It was * Residual debug code (CWE-489) - CVE-2020-25156 It was * Inappropriate access control (CWE-284) - CVE-2020-25160The expected impact depends on each vulnerability, but it may be affected as follows. It was * by a remote third party for administrative purposes Web Arbitrary scripts or HTML is inserted - CVE-2020-25158 It was * A remote third party redirects the user to a malicious website - CVE-2020-25154 It was * Theft of sensitive information or escalation of privileges by an unauthenticated remote third party - CVE-2020-25162 It was * By a remote third party Web Session stolen or privilege escalation - CVE-2020-25152 It was * A local third party steals user credentials for the administrator interface - CVE-2020-25164 It was * Execute arbitrary commands by uploading a specially crafted file by a remote user - CVE-2020-25150 It was * Malicious firmware that can tamper with the device is generated by a third party with access to the product - CVE-2020-25166 It was * by a third party, from the command line on the underlying Linux After connecting to the system, root elevated to privilege - CVE-2020-16238 It was * Based on the authentication information hard-coded by a third party, the device can be operated from the command line. Wi-Fi connected to the module - CVE-2020-25168 It was * By a remote third party root Connected to the device with authorization - CVE-2020-25156 It was * The network configuration information of the device is stolen or tampered with by a third party - CVE-2020-25160
VAR-202010-1033 CVE-2020-3499 Cisco Firepower Management Center  Resource depletion vulnerability in software CVSS V2: 5.0
CVSS V3: 8.6
Severity: HIGH
A vulnerability in the licensing service of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.The vulnerability is due to improper handling of system resource values by the affected system. An attacker could exploit this vulnerability by sending malicious requests to the targeted system. A successful exploit could allow the attacker to cause the affected system to become unresponsive, resulting in a DoS condition and preventing the management of dependent devices
VAR-202010-1013 CVE-2020-3410 Cisco Firepower Management Center  Authentication vulnerabilities in software CVSS V2: 6.8
CVSS V3: 8.1
Severity: HIGH
A vulnerability in the Common Access Card (CAC) authentication feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and access the FMC system. The attacker must have a valid CAC to initiate the access attempt. The vulnerability is due to incorrect session invalidation during CAC authentication. An attacker could exploit this vulnerability by performing a CAC-based authentication attempt to an affected system. A successful exploit could allow the attacker to access an affected system with the privileges of a CAC-authenticated user who is currently logged in
VAR-202010-1046 CVE-2020-3563 Cisco Firepower Threat Defense  Resource depletion vulnerability in software CVSS V2: 7.8
CVSS V3: 8.6
Severity: HIGH
A vulnerability in the packet processing functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to inefficient memory management. An attacker could exploit this vulnerability by sending a large number of TCP packets to a specific port on an affected device. A successful exploit could allow the attacker to exhaust system memory, which could cause the device to reload unexpectedly. No manual intervention is needed to recover the device after it has reloaded
VAR-202010-1042 CVE-2020-3577 Cisco Firepower Threat Defense  Software input verification vulnerability CVSS V2: 6.1
CVSS V3: 7.4
Severity: HIGH
A vulnerability in the ingress packet processing path of Cisco Firepower Threat Defense (FTD) Software for interfaces that are configured either as Inline Pair or in Passive mode could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation when Ethernet frames are processed. An attacker could exploit this vulnerability by sending malicious Ethernet frames through an affected device. A successful exploit could allow the attacker do either of the following: Fill the /ngfw partition on the device: A full /ngfw partition could result in administrators being unable to log in to the device (including logging in through the console port) or the device being unable to boot up correctly. Note: Manual intervention is required to recover from this situation. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition. Cause a process crash: The process crash would cause the device to reload. No manual intervention is necessary to recover the device after the reload. Cisco Firepower Threat Defense (FTD) The software contains an input verification vulnerability.Denial of service (DoS) It may be put into a state
VAR-202010-1015 CVE-2020-3436 Cisco Adaptive Security Appliance  and  Cisco Firepower Threat Defense  Vulnerability in software regarding unlimited upload of dangerous types of files CVSS V2: 7.8
CVSS V3: 8.6
Severity: HIGH
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to upload arbitrary-sized files to specific folders on an affected device, which could lead to an unexpected device reload. The vulnerability exists because the affected software does not efficiently handle the writing of large files to specific folders on the local file system. An attacker could exploit this vulnerability by uploading files to those specific folders. A successful exploit could allow the attacker to write a file that triggers a watchdog timeout, which would cause the device to unexpectedly reload, causing a denial of service (DoS) condition. Cisco Adaptive Security Appliances Software is a firewall and network security platform. The platform provides features such as highly secure access to data and network resources
VAR-202010-1038 CVE-2020-3564 Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense software Vulnerability related to authority management in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A vulnerability in the FTP inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass FTP inspection. The vulnerability is due to ineffective flow tracking of FTP traffic. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and successfully complete FTP connections. The platform provides features such as highly secure access to data and network resources
VAR-202010-1010 CVE-2020-3317 Cisco Firepower Threat Defense  Software input verification vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the ssl_inspection component of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to crash Snort instances. The vulnerability is due to insufficient input validation in the ssl_inspection component. An attacker could exploit this vulnerability by sending a malformed TLS packet through a Cisco Adaptive Security Appliance (ASA). A successful exploit could allow the attacker to crash a Snort instance, resulting in a denial of service (DoS) condition. apt is a command-line package manager of the Debian Project Partnership, which provides functions for searching, managing and querying package information
VAR-202010-1044 CVE-2020-3561 Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software injection vulnerabilities CVSS V2: 4.3
CVSS V3: 4.7
Severity: MEDIUM
A vulnerability in the Clientless SSL VPN (WebVPN) of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to inject arbitrary HTTP headers in the responses of the affected system. The vulnerability is due to improper input sanitization. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to conduct a CRLF injection attack, adding arbitrary HTTP headers in the responses of the system and redirecting the user to arbitrary websites. The platform provides features such as highly secure access to data and network resources. Successful exploitation of this vulnerability allows attackers to exploit this vulnerability to perform CRLF injection attacks
VAR-202010-1051 CVE-2020-3555 Cisco Adaptive Security Appliance  and  Cisco Firepower Threat Defense  Improper resource shutdown and release vulnerabilities in software CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the SIP inspection process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a crash and reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to a watchdog timeout and crash during the cleanup of threads that are associated with a SIP connection that is being deleted from the connection list. An attacker could exploit this vulnerability by sending a high rate of crafted SIP traffic through an affected device. A successful exploit could allow the attacker to cause a watchdog timeout and crash, resulting in a crash and reload of the affected device. Cisco Adaptive Security Appliances Software is a firewall and network security platform. The platform provides features such as highly secure access to data and network resources
VAR-202010-1132 CVE-2020-3582 Cisco Adaptive Security Appliance  and  Cisco Firepower Threat Defense  Cross-site scripting vulnerabilities in software CVSS V2: 2.6
CVSS V3: 6.1
Severity: MEDIUM
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. The platform provides features such as highly secure access to data and network resources
VAR-202010-1019 CVE-2020-3528 Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense software Resource exhaustion vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the OSPF Version 2 (OSPFv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation when the affected software processes certain OSPFv2 packets with Link-Local Signaling (LLS) data. An attacker could exploit this vulnerability by sending a malformed OSPFv2 packet to an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. The platform provides features such as highly secure access to data and network resources
VAR-202010-1049 CVE-2020-3553 Cisco Firepower Management Center  Cross-site scripting vulnerabilities in software CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information
VAR-202010-1050 CVE-2020-3554 Cisco Adaptive Security Appliance  and  Cisco Firepower Threat Defense  Resource depletion vulnerability in software CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the TCP packet processing of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory exhaustion condition. An attacker could exploit this vulnerability by sending a high rate of crafted TCP traffic through an affected device. A successful exploit could allow the attacker to exhaust device resources, resulting in a DoS condition for traffic transiting the affected device. The platform provides features such as highly secure access to data and network resources
VAR-202010-1018 CVE-2020-3515 Cisco Firepower Management Center  Cross-site scripting vulnerabilities in software CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information