VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202008-0672 CVE-2020-15498 ASUS RT-AC1900P Certificate validation vulnerabilities in routers CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
An issue was discovered on ASUS RT-AC1900P routers before 3.0.0.4.385_20253. The router accepts an arbitrary server certificate for a firmware update. The culprit is the --no-check-certificate option passed to wget tool used to download firmware update files. ASUS RT-AC1900P A router contains a certificate validation vulnerability.Information may be tampered with. ASUS RT-AC1900P routers firmware upgrade processing certificate has security loopholes, allowing remote attackers to use loopholes to submit special requests, upgrade malicious firmware, and control the server
VAR-202008-0950 CVE-2020-5917 plural BIG-IP Cryptographic strength vulnerabilities in products CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.2 and BIG-IQ versions 5.2.0-7.0.0, the host OpenSSH servers utilize keys of less than 2048 bits which are no longer considered secure. plural BIG-IP The product contains a cryptographic strength vulnerability.Information may be obtained. F5 BIG-IP APM is a set of access and security solutions from F5 Corporation of the United States. The product provides unified access to business-critical applications and networks. BIG-IP version 15.1.0 to 15.1.0.4, version 15.0.0 to 15.0.1.3, version 14.1.0 to 14.1.2.3, version 13.1.0 to 13.1.3.4, 12.1.0 There are security vulnerabilities in versions between 12.1.5.1, 11.6.1 to 11.6.5.2, and BIG-IQ versions 5.2.0 to 7.0.0. The vulnerability stems from the fact that the initial key value of the OpenSSH service is less than 2048 and thus There is a security risk
VAR-202008-0938 CVE-2020-5922 plural BIG-IP Cross-site request forgery vulnerability in product CVSS V2: 9.3
CVSS V3: 8.8
Severity: HIGH
In BIG-IP versions 15.0.0-15.1.0.4, 14.1.0-14.1.2.6, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.2, iControl REST does not implement Cross Site Request Forgery protections for users which make use of Basic Authentication in a web browser. plural BIG-IP The product contains a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. F5 BIG-IP is a F5 load balancing device. F5 BIG-IP iControl REST has a cross-site request forgery vulnerability. A remote attacker can use this vulnerability to construct a malicious URI, trick the request, and perform malicious operations in the context of the target user. BIG-IP versions between 15.0.0 and 15.1.0.4, versions between 14.1.0 and 14.1.2.6, versions between 13.1.0 and 13.1.3.3, versions between 12.1.0 and 12.1.5.1 and 11.6.1 There is a security vulnerability in versions up to 11.6.5.2, which is caused by BIG-IP not adequately verifying that the request is from a trusted user. An attacker could exploit this vulnerability to send unexpected requests to the server through an affected client
VAR-202008-0941 CVE-2020-5925 plural BIG-IP Product Exceptional State Check Vulnerability CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, undisclosed internally generated UDP traffic may cause the Traffic Management Microkernel (TMM) to restart under some circumstances. plural BIG-IP The product contains an exceptional condition check vulnerability.Service operation interruption (DoS) It may be put into a state. F5 BIG-IP is a F5 load balancing device. F5 BIG-IP has security loopholes in processing UDP protocol data. Remote attackers can use this loophole to submit special requests to restart TMM and cause denial of service attacks. BIG-IP version 15.1.0 to 15.1.0.4, version 15.0.0 to 15.0.1.3, version 14.1.0 to 14.1.2.3, version 13.1.0 to 13.1.3.3, 12.1.0 Versions up to 12.1.5.1 and versions between 11.6.1 and 11.6.5.1 have security vulnerabilities
VAR-202008-0948 CVE-2020-5913 BIG-IP Certificate validation vulnerabilities in CVSS V2: 5.8
CVSS V3: 7.4
Severity: HIGH
In versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.2, the BIG-IP Client or Server SSL profile ignores revoked certificates, even when a valid CRL is present. This impacts SSL/TLS connections and may result in a man-in-the-middle attack on the connections. BIG-IP Exists in a certificate validation vulnerability.Information may be obtained and tampered with. BIG-IP Server versions between 15.0.0 and 15.1.0.1, versions between 14.1.0 and 14.1.2.3, versions between 13.1.0 and 13.1.3.4, versions between 12.1.0 and 12.1.5.1, and 11.6 There are security vulnerabilities in versions between .1 and 11.6.5.2
VAR-202008-0947 CVE-2020-5916 plural  BIG-IP  Information leakage vulnerabilities in products CVSS V2: 4.0
CVSS V3: 6.8
Severity: MEDIUM
In BIG-IP versions 15.1.0-15.1.0.4 and 15.0.0-15.0.1.3 the Certificate Administrator user role and higher privileged roles can perform arbitrary file reads outside of the web root directory. plural BIG-IP The product contains a vulnerability related to information leakage.Information may be obtained. F5 BIG-IP is a load balancing device. F5 BIG-IP has a directory traversal vulnerability. There are security vulnerabilities in BIG-IP versions between 15.1.0 and 15.1.0.4 and versions between 15.0.0 and 15.0.1.3
VAR-202008-0942 CVE-2020-5926 plural BIG-IP Improper resource shutdown and release vulnerabilities in the product CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, and 14.1.0-14.1.2.6, a BIG-IP virtual server with a Session Initiation Protocol (SIP) ALG profile, parsing SIP messages that contain a multi-part MIME payload with certain boundary strings can cause TMM to free memory to the wrong cache. plural BIG-IP The product contains a vulnerability related to improper shutdown and release of resources.Service operation interruption (DoS) It may be put into a state. There are security vulnerabilities in BIG-IP versions between 15.1.0 and 15.1.0.4, versions between 15.0.0 and 15.0.1.3, and versions between 14.1.0 and 14.1.2.6. The vulnerability is caused by TMM releasing memory to the wrong buffering
VAR-202008-0936 CVE-2020-5920 BIG-IP AFM In SQL Injection vulnerabilities CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
In versions 15.0.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, a vulnerability in the BIG-IP AFM Configuration utility may allow any authenticated BIG-IP user to perform a read-only blind SQL injection attack. BIG-IP AFM To SQL An injection vulnerability exists.Information may be obtained. F5 BIG-IP AFM is an advanced firewall device. Remote attackers can use this vulnerability to submit special SQL requests, manipulate databases, obtain sensitive information or execute arbitrary codes. BIG-IP AFM versions between 15.0.0 and 15.1.0.5, versions between 14.1.0 and 14.1.2.7, versions between 13.1.0 and 13.1.3.4, versions between 12.1.0 and 12.1.5.1 and 11.6. There are security vulnerabilities in versions between 1 and 11.6.5.1, which are caused by the lack of validation of externally input SQL statements in database-based applications. Attackers can exploit this vulnerability to execute illegal SQL commands
VAR-202008-0939 CVE-2020-5923 plural BIG-IP Product vulnerabilities CVSS V2: 4.8
CVSS V3: 5.4
Severity: MEDIUM
In BIG-IP versions 15.0.0-15.1.0.4, 14.1.0-14.1.2.6, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1 and BIG-IQ versions 5.4.0-7.0.0, Self-IP port-lockdown bypass via IPv6 link-local addresses. plural BIG-IP The product contains unspecified vulnerabilities.Information may be obtained and tampered with. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. BIG-IP version 15.0.0 to 15.1.0.4, version 14.1.0 to 14.1.2.6, version 13.1.0 to 13.1.3.3, version 12.1.0 to 12.1.5.1, version 11.6.1 There are security vulnerabilities in versions between 11.6.5.1 and BIG-IQ5.4.0 to 7.0.0. The vulnerability stems from the fact that IPv6 connections to local addresses will cause private ip ports to be locked
VAR-202008-0949 CVE-2020-5914 BIG-IP ASM Vulnerability regarding input verification in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
In BIG-IP ASM versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, undisclosed server cookie scenario may cause BD to restart under some circumstances. BIG-IP ASM There is an input verification vulnerability in.Service operation interruption (DoS) It may be put into a state. BIG-IP ASM version between 15.1.0 and 15.1.0.4, version between 15.0.0 and 15.0.1.3, version between 14.1.0 and 14.1.2.3, version between 13.1.0 and 13.1.3.3, version 12.1. Versions between 0 and 12.1.5.1, and versions between 11.6.1 and 11.6.5.1 have security vulnerabilities. Currently there is no information about this vulnerability. Please keep an eye on CNNVD or manufacturer announcements
VAR-202008-0944 CVE-2020-5928 BIG-IP ASM Cross-site request forgery vulnerability in CVSS V2: 3.3
CVSS V3: 3.1
Severity: LOW
In versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, BIG-IP ASM Configuration utility CSRF protection token can be reused multiple times. BIG-IP ASM Exists in a cross-site request forgery vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. BIG-IP ASM version between 15.1.0 and 15.1.0.4, version between 15.0.0 and 15.0.1.3, version between 14.1.0 and 14.1.2.3, version between 13.1.0 and 13.1.3.3, version 12.1. There are CSRF vulnerabilities in versions between 0 and 12.1.5.1 and versions between 11.6.1-11.6.5.1. The vulnerability is caused by the fact that the WEB application in BIG-IP ASM does not fully verify whether the request is from a trusted user. An attacker could exploit this vulnerability to send unexpected requests to the server through an affected client
VAR-202008-0940 CVE-2020-5924 BIG-IP APM Vulnerability regarding lack of resource release after valid lifetime in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
In BIG-IP APM versions 12.1.0-12.1.5.1 and 11.6.1-11.6.5.2, RADIUS authentication leaks memory when the username for authentication is not set. BIG-IP APM Is vulnerable to a lack of resource release after a valid lifetime.Service operation interruption (DoS) It may be put into a state. There is a security vulnerability in BIG-IP APM versions 12.1.0 to 12.1.5.1 and 11.6.1 to 11.6.5.2. loophole
VAR-202008-0935 CVE-2020-5919 BIG-IP APM Vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
In versions 15.1.0-15.1.0.4, rendering of certain session variables by BIG-IP APM UI-based agents in an access profile configured with Modern customization, may cause the Traffic Management Microkernel (TMM) to stop responding. BIG-IP APM There is an unspecified vulnerability in.Service operation interruption (DoS) It may be put into a state
VAR-202008-1252 CVE-2020-9081 plural  Huawei  Fraudulent Authentication Vulnerability in Products CVSS V2: -
CVSS V3: 3.5
Severity: LOW
There is an improper authorization vulnerability in some Huawei smartphones. An attacker could perform a series of operation in specific mode to exploit this vulnerability. Successful exploit could allow the attacker to bypass app lock. (Vulnerability ID: HWPSIRT-2019-12144) This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9081. Mate 20 firmware, P30 firmware, P30 Pro firmware etc. Huawei The product contains an incorrect authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202008-1244 CVE-2020-9089 Huawei  of  P30 Pro  Firmware vulnerabilities CVSS V2: -
CVSS V3: 3.3
Severity: LOW
There is an information vulnerability in Huawei smartphones. A function in a module can be called without verifying the caller's access. Attackers with user access can exploit this vulnerability to obtain some information. This can lead to information leak. (Vulnerability ID: HWPSIRT-2019-12141) This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9089. Huawei of P30 Pro There are unspecified vulnerabilities in the firmware.Information may be obtained
VAR-202010-0410 CVE-2020-17407 Microhard Bullet-LTE  Stack-based buffer overflow vulnerability in CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microhard Bullet-LTE prior to v1.2.0-r1112. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of authentication headers. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-10596. Microhard Bullet-LTE Exists in a stack-based buffer overflow vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-10596 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202010-0409 CVE-2020-17406 Microhard Bullet-LTE  In  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microhard Bullet-LTE prior to v1.2.0-r1112. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of the ping parameter provided to tools.sh. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-10595. Microhard Bullet-LTE Has OS A command injection vulnerability exists. Zero Day Initiative To this vulnerability ZDI-CAN-10595 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202008-0373 CVE-2020-16245 Advantech iView path traversal vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Advantech iView, Versions 5.7 and prior. The affected product is vulnerable to path traversal vulnerabilities that could allow an attacker to create/download arbitrary files, limit system availability, and remotely execute code. iView Is Advantech Provided by the company SNMP Base device management software. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of calls to the exportTaskMgrReport method of the DeviceTreeTable class. When parsing the filename parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Advantech iView is an equipment management application for the energy, water and wastewater industries. The vulnerability stems from the failure of Advantech iView to properly filter resources or special elements in file paths
VAR-202008-1256 CVE-2020-16235 Emerson  Made  OpenEnterprise  Vulnerability of insufficient encryption strength CVSS V2: 2.1
CVSS V3: 6.5
Severity: MEDIUM
Inadequate encryption may allow the credentials used by Emerson OpenEnterprise, up through version 3.3.5, to access field devices and external systems to be obtained. OpenEnterprise teeth Emerson Industrial SCADA It's software
VAR-202008-1215 CVE-2020-24616 FasterXML jackson-databind Code injection vulnerability in CVSS V2: 6.8
CVSS V3: 8.1
Severity: HIGH
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP). FasterXML jackson-databind Exists in a code injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Versions earlier than 2.9.10.6 in the FasterXML jackson-databind 2.x series have security vulnerabilities. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements