VARIoT IoT vulnerabilities database
| VAR-202010-0711 | CVE-2020-1677 | Juniper Networks Mist Cloud UI Input confirmation vulnerability |
CVSS V2: 4.3 CVSS V3: 7.2 Severity: MEDIUM |
When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle child elements in SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. It provides services across public and private clouds, Docker container and KVM Hypervisor servers provide cost and usage reports, RBAC , management, provisioning, orchestration, monitoring and automation. The following products and versions are affected: 2020 Year 9 moon 2 version before date
| VAR-202010-0710 | CVE-2020-1676 | Juniper Networks Mist Cloud UI Vulnerability in handling exceptional conditions in |
CVSS V2: 4.3 CVSS V3: 7.2 Severity: HIGH |
When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. It provides cost and usage reporting, RBAC, management, provisioning, orchestration, monitoring and automation for servers across public and private clouds, Docker containers and KVM hypervisors. The following products and versions are affected: Versions before September 2, 2020
| VAR-202010-0406 | CVE-2020-1675 | Juniper Networks Mist Cloud UI Authentication vulnerabilities in |
CVSS V2: 4.3 CVSS V3: 8.3 Severity: MEDIUM |
When Security Assertion Markup Language (SAML) authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly process invalid authentication certificates which could allow a malicious network-based user to access unauthorized data. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. It provides cost and usage reporting, RBAC, management, provisioning, orchestration, monitoring and automation for servers across public and private clouds, Docker containers and KVM hypervisors. The following products and versions are affected: Versions before September 2, 2020. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass access restrictions
| VAR-202102-0294 | CVE-2020-25161 | Advantech Made WebAccess/SCADA Filename and pathname external control vulnerabilities |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
The WADashboard component of WebAccess/SCADA Versions 9.0 and prior may allow an attacker to control or influence a path used in an operation on the filesystem and remotely execute code as an administrator. Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the WADashboard component. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There are security vulnerabilities in WebAccess/SCADA WADashboard version 9.0 and earlier versions
| VAR-202010-1625 | No CVE | A Binary Vulnerability in ScreenEditor of Delta Electronics Industry Co., Ltd. (CNVD-2020-56009) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Delta Electronics was established in 1971 to provide power management and cooling solutions worldwide. ScreenEditor is a configuration software in Delta CNCSoft software suite.
The ScreenEditor of Delta Electronics Industry Co., Ltd. has a binary vulnerability that can be exploited by attackers to cause a denial of service.
| VAR-202010-1626 | No CVE | Binary Vulnerability in ScreenEditor of Delta Electronics Industry Co., Ltd. |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Delta Electronics was established in 1971 to provide power management and cooling solutions worldwide. ScreenEditor is a configuration software in Delta CNCSoft software suite.
The ScreenEditor of Delta Electronics Industry Co., Ltd. has a binary vulnerability that can be exploited by attackers to cause a denial of service.
| VAR-202010-1635 | No CVE | Binary Vulnerability in WebAccess/SCADA of Advantech (China) Co., Ltd. |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Advantech WebAccess SCADA is a HMI/SCADA monitoring software based entirely on IE browser.
Advantech (China) Co., Ltd. has a binary vulnerability in WebAccess/SCADA. Attackers can use the vulnerability to cause a denial of service.
| VAR-202010-1637 | No CVE | Rockwell Automation 1769-L33ER has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Rockwell Automation is an industrial automation and information company.
Rockwell Automation 1769-L33ER has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202010-0741 | CVE-2020-1689 | Juniper Networks Junos OS Resource Depletion Vulnerability |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: LOW |
On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in a Virtual Chassis configuration, receipt of a stream of specific layer 2 frames can cause high CPU load, which could lead to traffic interruption. This issue does not occur when the device is deployed in Stand Alone configuration. The offending layer 2 frame packets can originate only from within the broadcast domain where the device is connected. This issue affects Juniper Networks Junos OS on EX4300-MP Series, EX4600 Series and QFX5K Series: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2. Juniper Networks Junos OS Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state.
Junos OS EX/QFX has a security loophole in the processing of via Virtual Chassis. Remote attackers can use this loophole to submit special requests, perform denial of service attacks, and crash the service program
| VAR-202010-1437 | CVE-2020-4636 | IBM Resilient OnPrem Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: High |
IBM Resilient OnPrem 38.2 could allow a privileged user to inject malicious commands through Python3 scripting. IBM X-Force ID: 185503. IBM Resilient OnPrem Contains a command injection vulnerability. Vendor exploits this vulnerability IBM X-Force ID: 185503 Is published as.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202010-0152 | CVE-2019-4552 | IBM Security Access Manager and IBM Security Verify Access Vulnerability in |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 are vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 165960. Vendor exploits this vulnerability IBM X-Force ID: 165960 Is published as.Information may be obtained and information may be tampered with. The product implements access management control through integrated devices for Web, mobile, and cloud computing. response
| VAR-202010-1454 | CVE-2020-4499 | IBM Security Access Manager and IBM Security Verify Access Vulnerability in Microsoft |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 could allow an unauthorized public Oauth client to bypass some or all of the authentication checks and gain access to applications. IBM X-Force ID: 182216. Vendor exploits this vulnerability IBM X-Force ID: 182216 Is published as.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. The product implements access management control through integrated devices for Web, mobile, and cloud computing
| VAR-202010-0724 | CVE-2020-1688 | Juniper Networks Junos OS Vulnerability regarding lack of encryption of critical data in |
CVSS V2: 2.1 CVSS V3: 6.5 Severity: LOW |
On Juniper Networks SRX Series and NFX Series, a local authenticated user with access to the shell may obtain the Web API service private key that is used to provide encrypted communication between the Juniper device and the authenticator services. Exploitation of this vulnerability may allow an attacker to decrypt the communications between the Juniper device and the authenticator service. This Web API service is used for authentication services such as the Juniper Identity Management Service, used to obtain user identity for Integrated User Firewall feature, or the integrated ClearPass authentication and enforcement feature. This issue affects Juniper Networks Junos OS on Networks SRX Series and NFX Series: 12.3X48 versions prior to 12.3X48-D105; 15.1X49 versions prior to 15.1X49-D190; 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S11, 17.4R3; 18.1 versions prior to 18.1R3-S7; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2-S4, 18.3R3; 18.4 versions prior to 18.4R1-S7, 18.4R2; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S4, 19.2R2. Juniper Networks Junos OS There is a vulnerability in the lack of encryption of critical data.Information may be obtained.
Junos OS SRX/NFX has security loopholes in the processing of Web API private keys. Remote attackers can use this loophole to submit special requests and increase privileges
| VAR-202010-1528 | CVE-2020-1666 | Juniper Networks Junos OS Evolved Session deadline vulnerability |
CVSS V2: 7.2 CVSS V3: 6.6 Severity: HIGH |
The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the console the ability to resume a previous interactive session and possibly gain administrative privileges. This issue affects all Juniper Networks Junos OS Evolved versions after 18.4R1-EVO, prior to 20.2R1-EVO. The operating system provides a secure programming interface and Junos SDK. Junos OS Evolved is an upgraded version of Junos OS. A security vulnerability exists in Junos OS Evolved that could allow an attacker to bypass restrictions by ignoring logoff-disconnect in order to escalate his privileges
| VAR-202010-1527 | CVE-2020-1678 | Juniper Networks Junos OS Vulnerabilities in lack of freeing resources after a valid lifetime |
CVSS V2: 2.9 CVSS V3: 6.5 Severity: LOW |
On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by executing the "show task memory detail | match policy | match evpn" command multiple times to check if memory (Alloc Blocks value) is increasing. root@device> show task memory detail | match policy | match evpn ------------------------ Allocator Memory Report ------------------------ Name | Size | Alloc DTXP Size | Alloc Blocks | Alloc Bytes | MaxAlloc Blocks | MaxAlloc Bytes Policy EVPN Params 20 24 3330678 79936272 3330678 79936272 root@device> show task memory detail | match policy | match evpn ------------------------ Allocator Memory Report ------------------------ Name | Size | Alloc DTXP Size | Alloc Blocks | Alloc Bytes | MaxAlloc Blocks | MaxAlloc Bytes Policy EVPN Params 20 24 36620255 878886120 36620255 878886120 This issue affects: Juniper Networks Junos OS 19.4 versions prior to 19.4R2; 20.1 versions prior to 20.1R1-S4, 20.1R2; Juniper Networks Junos OS Evolved: 19.4 versions; 20.1 versions prior to 20.1R1-S4-EVO, 20.1R2-EVO; 20.2 versions prior to 20.2R1-EVO; This issue does not affect: Juniper Networks Junos OS releases prior to 19.4R1. Juniper Networks Junos OS Evolved releases prior to 19.4R1-EVO. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Junos OS that an attacker could exploit to create a memory leak through EVPN to trigger a denial of service
| VAR-202010-1526 | CVE-2020-1681 | Juniper Networks Junos OS Evolved Vulnerability in handling exceptional conditions in |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: LOW |
Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). The process automatically restarts without intervention, but a continuous receipt of the malformed NDP packets could leaded to an extended Denial of Service condition. During this time, IPv6 neighbor learning will be affected. The issue occurs when parsing the incoming malformed NDP packet. Rather than simply discarding the packet, the process asserts, performing a controlled exit and restart, thereby avoiding any chance of an unhandled exception. Exploitation of this vulnerability is limited to a temporary denial of service, and cannot be leveraged to cause additional impact on the system. This issue is limited to the processing of IPv6 NDP packets. IPv4 packet processing cannot trigger, and is unaffected by this vulnerability. This issue affects all Juniper Networks Junos OS Evolved versions prior to 20.1R2-EVO. Junos OS is unaffected by this vulnerability. The operating system provides a secure programming interface and Junos SDK. Junos OS Evolved is an upgraded version of Junos OS. Attackers can use this vulnerability to send malicious NDP packets to trigger denial of service
| VAR-202010-0875 | CVE-2020-25157 | Advantech Made R-SeeNet To SQL Injection vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The R-SeeNet webpage (1.5.1 through 2.4.10) suffers from SQL injection, which allows a remote attacker to invoke queries on the database and retrieve sensitive information. Advantech Provided by the company R-SeeNet Is an application for monitoring routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within device_position.php. When parsing the device_id parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. The software monitors the platform based on the snmp protocol, and is suitable for Linux and Windows platforms. There are SQL injection vulnerabilities in R-SeeNet Versions 1.5.1 to 2.4.10
| VAR-202010-0721 | CVE-2020-1687 | Juniper Networks Junos OS Resource Depletion Vulnerability |
CVSS V2: 2.9 CVSS V3: 6.5 Severity: LOW |
On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, receipt of a stream of specific VXLAN encapsulated layer 2 frames can cause high CPU load, which could lead to network protocol operation issue and traffic interruption. This issue affects devices that are configured as a Layer 2 or Layer 3 gateway of an EVPN-VXLAN deployment. The offending layer 2 frames that cause the issue originate from a different access switch that get encapsulated within the same EVPN-VXLAN domain. This issue affects Juniper Networks Junos OS on EX4300-MP Series, EX4600 Series and QFX5K Series: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R2-S1, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2. Juniper Networks Junos OS Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state. This product provides an exclusive electrical signal path for any two network nodes connected to the switch. A security vulnerability exists in Junos OS EX/QFX that could be exploited by an attacker to trigger a fatal error via EVPN-VXLAN to trigger a denial of service
| VAR-202010-0716 | CVE-2020-1684 | Juniper Networks SRX Run on the series Junos OS Resource Depletion Vulnerability |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
On Juniper Networks SRX Series configured with application identification inspection enabled, receipt of specific HTTP traffic can cause high CPU load utilization, which could lead to traffic interruption. Application identification is enabled by default and is automatically turned on when Intrusion Detection and Prevention (IDP), AppFW, AppQoS, or AppTrack is configured. Thus, this issue might occur when IDP, AppFW, AppQoS, or AppTrack is configured. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D105; 15.1X49 versions prior to 15.1X49-D221, 15.1X49-D230; 17.4 versions prior to 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S3; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R2-S5, 18.4R3-S1; 19.1 versions prior to 19.1R2-S2, 19.1R3; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R2. Juniper Networks SRX Run on the series Junos OS Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state. Juniper Networks Junos OS SRX is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware equipment. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Junos OS SRX that could be exploited by an attacker to trigger an overload through application identification to trigger a denial of service
| VAR-202010-0719 | CVE-2020-1686 | Juniper Networks Junos OS Vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
On Juniper Networks Junos OS devices, receipt of a malformed IPv6 packet may cause the system to crash and restart (vmcore). This issue can be trigged by a malformed IPv6 packet destined to the Routing Engine. An attacker can repeatedly send the offending packet resulting in an extended Denial of Service condition. Only IPv6 packets can trigger this issue. IPv4 packets cannot trigger this issue. This issue affects Juniper Networks Junos OS 18.4 versions prior to 18.4R2-S4, 18.4R3-S1; 19.1 versions prior to 19.1R2-S1, 19.1R3; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2. This issue does not affect Juniper Networks Junos OS prior to 18.4R1. The operating system provides a secure programming interface and Junos SDK