VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202008-1053 CVE-2020-9095 HUAWEI P30 Pro Integer overflow vulnerability in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
HUAWEI P30 Pro smartphone with Versions earlier than 10.1.0.160(C00E160R2P8) has an integer overflow vulnerability. Some functions are lack of verification when they process some messages sent from other module. Attackers can exploit this vulnerability by send malicious message to cause integer overflow. This can compromise normal service. Huawei P30 Pro is a smart phone of China's Huawei (Huawei) company
VAR-202008-0791 CVE-2020-3152 Cisco Connected Mobile Experiences Vulnerability regarding improper default permissions in CVSS V2: 7.2
CVSS V3: 6.7
Severity: MEDIUM
A vulnerability in Cisco Connected Mobile Experiences (CMX) could allow an authenticated, local attacker with administrative credentials to execute arbitrary commands with root privileges. The vulnerability is due to improper user permissions that are configured by default on an affected system. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root. To exploit this vulnerability, an attacker would need to have valid administrative credentials. (DoS) It may be put into a state
VAR-202008-0830 CVE-2020-3496 Cisco Small Business Smart and Managed Switch Input verification vulnerability in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected
VAR-202008-1217 CVE-2020-3505 Cisco Video Surveillance 8000 series IP Resource depletion vulnerability in camera CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
A vulnerability in the Cisco Discovery Protocol of Cisco Video Surveillance 8000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect processing of certain Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending certain Cisco Discovery Protocol packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DOS condition. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Attackers can use this vulnerability to cause a denial of service
VAR-202008-0827 CVE-2020-3519 Cisco Data Center Network Manager Input verification vulnerability in CVSS V2: 5.5
CVSS V3: 8.1
Severity: HIGH
A vulnerability in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202008-0826 CVE-2020-3518 Cisco Data Center Network Manager Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of the affected software. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202008-0804 CVE-2020-3439 Cisco Data Center Network Manager Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202008-0805 CVE-2020-3440 Windows for Cisco Webex Meetings Desktop Path traversal vulnerabilities in applications CVSS V2: 4.3
CVSS V3: 6.5
Severity: MEDIUM
A vulnerability in Cisco Webex Meetings Desktop App for Windows could allow an unauthenticated, remote attacker to overwrite arbitrary files on an end-user system. The vulnerability is due to improper validation of URL parameters that are sent from a website to the affected application. An attacker could exploit this vulnerability by persuading a user to follow a URL to a website that is designed to submit crafted input to the affected application. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system, possibly corrupting or deleting critical system files. Windows for Cisco Webex Meetings Desktop An application contains a path traversal vulnerability.Information may be tampered with. Both Cisco Webex Meetings Desktop App and Cisco Webex Meetings are products of Cisco. Cisco Webex Meetings is a set of video conferencing solutions
VAR-202008-0828 CVE-2020-3520 Cisco Data Center Network Manager Vulnerability regarding information leakage in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
A vulnerability in Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, local attacker to obtain confidential information from an affected device. The vulnerability is due to insufficient protection of confidential information on an affected device. An attacker at any privilege level could exploit this vulnerability by accessing local filesystems and extracting sensitive information from them. A successful exploit could allow the attacker to view sensitive data, which they could use to elevate their privilege. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202008-0809 CVE-2020-3522 Cisco Data Center Network Manager Unauthorized authentication vulnerability in CVSS V2: 6.5
CVSS V3: 6.3
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to bypass authorization on an affected device and access sensitive information that is related to the device. The vulnerability exists because the affected software allows users to access resources that are intended for administrators only. An attacker could exploit this vulnerability by submitting a crafted URL to an affected device. A successful exploit could allow the attacker to add, delete, and edit certain network configurations in the same manner as a user with administrative privileges. (DoS) It may be put into a state. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202008-0829 CVE-2020-3521 Cisco Data Center Network Manager Input verification vulnerability in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
A vulnerability in a specific REST API of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker with a low-privileged account could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to read arbitrary files on the affected system. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202008-0810 CVE-2020-3523 Cisco Data Center Network Manager Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions
VAR-202008-0824 CVE-2020-3491 Cisco Vision Dynamic Signage Director Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an authenticated, remote attacker with administrative privileges to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have administrative privileges on the affected device
VAR-202008-0822 CVE-2020-3485 Cisco Vision Dynamic Signage Director  Inappropriate Default Permission Vulnerability CVSS V2: 6.5
CVSS V3: 6.3
Severity: MEDIUM
A vulnerability in the role-based access control (RBAC) functionality of the web management software of Cisco Vision Dynamic Signage Director could allow an authenticated, remote attacker to access resources that they should not be able to access and perform actions that they should not be able to perform. The vulnerability exists because the web management software does not properly handle RBAC. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to view and delete certain screen content on the system that the attacker would not normally have privileges to access. Cisco Vision Dynamic Signage Director Is vulnerable to incorrect default permissions.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco Vision Dynamic Signage Director is an end-to-end dynamic signage and IPTV solution provided by Cisco
VAR-202008-0821 CVE-2020-3484 Cisco Vision Dynamic Signage Director Vulnerability regarding improper default permissions in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to view potentially sensitive information on an affected device. The vulnerability is due to incorrect permissions within Apache configuration. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to view potentially sensitive information on the affected device
VAR-202008-0819 CVE-2020-3466 Cisco DNA Center Cross-site scripting vulnerabilities in software CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Multiple vulnerabilities in the web-based management interface of Cisco DNA Center software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerabilities exist because the web-based management interface on an affected device does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco DNA Center The software contains a cross-site scripting vulnerability.Information may be obtained and tampered with
VAR-202008-0806 CVE-2020-3389 Cisco HyperFlex HX-Series Vulnerability in software lack of encryption of critical data CVSS V2: 2.1
CVSS V3: 4.4
Severity: MEDIUM
A vulnerability in the installation component of Cisco Hyperflex HX-Series Software could allow an authenticated, local attacker to retrieve the password that was configured at installation on an affected device. The vulnerability exists because sensitive information is stored as clear text. An attacker could exploit this vulnerability by authenticating to an affected device and navigating to the directory that contains sensitive information. A successful exploit could allow the attacker to obtain sensitive information in clear text from the affected device. Cisco HyperFlex HX-Series Software contains a vulnerability regarding the lack of encryption of critical data.Information may be obtained. flex is a program for recognizing lexical patterns in text
VAR-202008-0823 CVE-2020-3490 Cisco Vision Dynamic Signage Director Past Traversal Vulnerability in CVSS V2: 6.8
CVSS V3: 4.9
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an authenticated, remote attacker with administrative privileges to conduct directory traversal attacks and obtain read access to sensitive files on an affected system. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to read files on the underlying operating system with root privileges. To exploit this vulnerability, the attacker would need to have administrative privileges on the affected system. Cisco Vision Dynamic Signage Director Exists in a past traversal vulnerability.Information may be obtained
VAR-202008-0811 CVE-2020-3443 Cisco Smart Software Manager On-Prem Vulnerability regarding lack of authentication in CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to elevate privileges and execute commands with higher privileges. The vulnerability is due to insufficient authorization of the System Operator role capabilities. An attacker could exploit this vulnerability by logging in with the System Operator role, performing a series of actions, and then assuming a new higher privileged role. A successful exploit could allow the attacker to perform all actions associated with the privilege of the assumed role. If that role is an administrative role, the attacker would gain full access to the device. (DoS) It may be put into a state. Opera Software Opera is a web browser produced by Norway Opera Software Company, which supports multi-window browsing, custom user interface and other functions. Cisco Smart Software Manager On-Prem (SSM On-Prem) is a Cisco product license management component for Cisco products. A permission and access control issue vulnerability exists in Cisco SSM On-Prem
VAR-202008-0640 CVE-2020-15532 Silicon Labs Bluetooth Low Energy SDK Classic buffer overflow vulnerability in CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
Silicon Labs Bluetooth Low Energy SDK before 2.13.3 has a buffer overflow via packet data. This is an over-the-air denial of service vulnerability in Bluetooth LE in EFR32 SoCs and associated modules running Bluetooth SDK, supporting Central or Observer roles