VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202005-0680 CVE-2020-3178 Cisco Content Security Management Appliance input validation error vulnerability CVSS V2: 5.8
CVSS V3: 6.1
Severity: MEDIUM
Multiple vulnerabilities in the web-based GUI of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerabilities are due to improper input validation of the parameters of an HTTP request. An attacker could exploit these vulnerabilities by intercepting an HTTP request and modifying it to redirect a user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page or to obtain sensitive browser-based information. This type of attack is commonly referred to as an open redirect attack and is used in phishing attacks to get users to unknowingly visit malicious sites. The device is mainly used to manage all strategies, reports, audit information, etc. of e-mail and Web security devices
VAR-202005-0687 CVE-2020-3189 Cisco Firepower Threat Defense Software exhaustion vulnerabilities CVSS V2: 5.0
CVSS V3: 8.6
Severity: HIGH
A vulnerability in the VPN System Logging functionality for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a memory leak that can deplete system memory over time, which can cause unexpected system behaviors or device crashes. The vulnerability is due to the system memory not being properly freed for a VPN System Logging event generated when a VPN session is created or deleted. An attacker could exploit this vulnerability by repeatedly creating or deleting a VPN tunnel connection, which could leak a small amount of system memory for each logging event. A successful exploit could allow the attacker to cause system memory depletion, which can lead to a systemwide denial of service (DoS) condition. The attacker does not have any control of whether VPN System Logging is configured or not on the device, but it is enabled by default. Cisco Firepower Threat Defense (FTD) Software contains a resource exhaustion vulnerability.Service operation interruption (DoS) It may be put into a state. The following products and versions are affected: Cisco FTD Software Version 6.2.3.12, Version 6.2.3.13, Version 6.2.3.14, Version 6.2.3.15
VAR-202005-0692 CVE-2020-3253 Cisco Firepower Threat Defense Software vulnerabilities CVSS V2: 7.2
CVSS V3: 6.7
Severity: MEDIUM
A vulnerability in the support tunnel feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to access the shell of an affected device even though expert mode is disabled. The vulnerability is due to improper configuration of the support tunnel feature. An attacker could exploit this vulnerability by enabling the support tunnel, setting a key, and deriving the tunnel password. A successful exploit could allow the attacker to run any system command with root access on an affected device. Cisco Firepower Threat Defense (FTD) There are unspecified vulnerabilities in the software.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
VAR-202005-0716 CVE-2020-3318 Cisco Firepower Management Center Software and Firepower User Agent Vulnerabilities in the use of hard-coded credentials in software CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Multiple vulnerabilities in Cisco Firepower Management Center (FMC) Software and Cisco Firepower User Agent Software could allow an attacker to access a sensitive part of an affected system with a high-privileged account. For more information about these vulnerabilities, see the Details section of this advisory. (DoS) It may be put into a state. A trust management issue vulnerability exists in Cisco FMC Software due to the use of default static passwords for system accounts that cannot be changed by system administrators. A remote attacker could use this account to exploit this vulnerability to gain access to sensitive parts of the system
VAR-202005-0712 CVE-2020-3312 Cisco Firepower Threat Defense Vulnerability in improper permission assignment for critical resources in software CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the application policy configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data on an affected device. The vulnerability is due to insufficient application identification. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data
VAR-202005-0703 CVE-2020-3302 Cisco Firepower Management Center Input verification vulnerabilities in software CVSS V2: 8.5
CVSS V3: 8.1
Severity: HIGH
A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to overwrite files on the file system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file to the web UI on an affected device. A successful exploit could allow the attacker to overwrite files on the file system of the affected device
VAR-202005-0711 CVE-2020-3311 Cisco Firepower Management Center Open redirect vulnerabilities in software CVSS V2: 5.8
CVSS V3: 6.1
Severity: MEDIUM
A vulnerability in the web interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a specific malicious web page
VAR-202005-0695 CVE-2020-3256 Cisco Hosted Collaboration Mediation Fulfillment In software XML External entity vulnerabilities CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Hosted Collaboration Mediation Fulfillment (HCM-F) Software could allow an authenticated, remote attacker to gain read access to information that is stored on an affected system. To exploit this vulnerability, an attacker would need administrative privileges on the Cisco HCM-F Software. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by sending malicious requests that contain references in XML entities to an affected system. A successful exploit could allow the attacker to retrieve files from the local system, resulting in the disclosure of sensitive information. The product offers inventory management, license management, service provider toolkits, and more. A code issue vulnerability exists in the Web-based management interface in Cisco HCM-F Software Release prior to 12.5(1)SU2
VAR-202005-0682 CVE-2020-3125 Cisco Adaptive Security Appliance Authentication vulnerabilities in software CVSS V2: 6.8
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in the Kerberos authentication feature of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to impersonate the Kerberos key distribution center (KDC) and bypass authentication on an affected device that is configured to perform Kerberos authentication for VPN or local device access. The vulnerability is due to insufficient identity verification of the KDC when a successful authentication response is received. An attacker could exploit this vulnerability by spoofing the KDC server response to the ASA device. This malicious response would not have been authenticated by the KDC. A successful attack could allow an attacker to bypass Kerberos authentication. Cisco Adaptive Security Appliance (ASA) The software contains an authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The platform provides features such as highly secure access to data and network resources. The following products and versions are affected: Cisco ASA Software 9.6 and earlier, 9.7, 9.8, 9.9, 9.10, 9.12, 9.13
VAR-202005-0684 CVE-2020-3186 Cisco Firepower Threat Defense Input verification vulnerabilities in software CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A vulnerability in the management access list configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured management interface access list on an affected system. The vulnerability is due to the configuration of different management access lists, with ports allowed in one access list and denied in another. An attacker could exploit this vulnerability by sending crafted remote management traffic to the local IP address of an affected system. A successful exploit could allow the attacker to bypass the configured management access list policies, and traffic to the management interface would not be properly denied. Cisco Firepower Threat Defense (FTD) The software contains an input verification vulnerability.Information may be tampered with. Cisco FTD versions 6.3.0, 6.4.0, and 6.5.0 have an access control error vulnerability. is prohibited
VAR-202005-0681 CVE-2020-3179 Cisco Firepower Threat Defense Double release vulnerability in software CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory handling error when GRE over IPv6 traffic is processed. An attacker could exploit this vulnerability by sending crafted GRE over IPv6 packets with either IPv4 or IPv6 payload through an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition. Cisco Firepower Threat Defense (FTD) The software contains a double release vulnerability.Service operation interruption (DoS) It may be put into a state
VAR-202005-0718 CVE-2020-3334 Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software exhaustion vulnerabilities CVSS V2: 6.1
CVSS V3: 7.4
Severity: HIGH
A vulnerability in the ARP packet processing of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Security Appliances could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect processing of ARP packets received by the management interface of an affected device. An attacker could exploit this vulnerability by sending a series of unicast ARP packets in a short timeframe that would reach the management interface of an affected device. A successful exploit could allow the attacker to consume resources on an affected device, which would prevent the device from sending internal system keepalives and eventually cause the device to reload, resulting in a denial of service (DoS) condition. \. The platform provides features such as highly secure access to data and network resources
VAR-202005-0691 CVE-2020-3246 Cisco Umbrella Injection vulnerabilities in CVSS V2: 4.3
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability in the web server of Cisco Umbrella could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user of an affected service. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to the browser of the user. Cisco Umbrella There is an injection vulnerability in.Information may be tampered with. Cisco Umbrella is a cloud security platform of Cisco (Cisco). The platform protects against cyber threats such as phishing, malware, and ransomware
VAR-202005-1040 CVE-2020-3329 plural Cisco Product permission management vulnerabilities CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability in role-based access control of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow a read-only authenticated, remote attacker to disable user accounts on an affected system. The vulnerability is due to incorrect allocation of the enable/disable action button under the role-based access control code on an affected system. An attacker could exploit this vulnerability by authenticating as a read-only user and then updating the roles of other users to disable them. A successful exploit could allow the attacker to disable users, including administrative users. are all products of Cisco (Cisco). Cisco UCS Director is a heterogeneous platform for Private Cloud Infrastructure as a Service (IaaS). Remote attackers can exploit this vulnerability to perform illegal operations. The following products and versions are affected: IMC Supervisor 1.1.0.0 and later (version 2.2.1.3 is fixed); UCS Director 5.4.0.0 and later (version 6.7.4.0 is fixed); UCS Director Express for Big Data 2.0.0.0 and later versions (fixed in version 3.7.4.0)
VAR-202005-0715 CVE-2020-3315 plural Cisco Vulnerability in leaking resources to the wrong area in the product CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors in how the Snort detection engine handles specific HTTP responses. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network. plural Cisco The product contains a vulnerability related to the leakage of resources to the wrong area.Information may be tampered with. Cisco 3000 Series Industrial Security Appliances, etc. are all products of Cisco in the United States. Cisco 3000 Series Industrial Security Appliances is a 3000 series firewall appliance. Cloud Services Router 1000V Series is a 1000v series cloud service router. Cisco 1000 Series Integrated Services Routers (ISRs) are 1000 series integrated services routers. payload. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5354-1 security@debian.org https://www.debian.org/security/ Markus Koschany February 18, 2023 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : snort CVE ID : CVE-2020-3299 CVE-2020-3315 CVE-2021-1223 CVE-2021-1224 CVE-2021-1236 CVE-2021-1494 CVE-2021-1495 CVE-2021-34749 CVE-2021-40114 Debian Bug : 1021276 Multiple security vulnerabilities were discovered in snort, a flexible Network Intrusion Detection System, which could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or bypass filtering technology on an affected device and ex-filtrate data from a compromised host. For the stable distribution (bullseye), these problems have been fixed in version 2.9.20-0+deb11u1. We recommend that you upgrade your snort packages. For the detailed security status of snort please refer to its security tracker page at: https://security-tracker.debian.org/tracker/snort Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmPw/Y5fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQRrA/9EQ9kF1LT2fYUGFMyKeCQQFTB8tfIsyz2VUrGUtWlVDKsDVqfEMWa6Zwx rAaFnAPOBi1KNX1laencuphuiDIxLmvA0ShpHKo/R3vY4WXmNwJMjPWNr82oTw8j CEggyfj9i5V1EwZZi0B3L4WP1pCQcJRN6XVB3FJWZScyQFtRH0xO7l9acIV68lTs 9hGDDe2wn5ufHh0sXskZitgYoXfdHjjl3CzFxrmGGDq9KFr8rDIEUnZrm58DCRNL RkDmvxrEEsXGmzQlhT/2ea88aIXgNM4xnDztr3iV1v8JOMb6BwehrH43NgdDb5V8 6xBcHuXOLNI75mca1TQxwUd8PSNo3YK60IbDC2ztcUIIvl1xk8bDFyABb3gKvGoR izKFYej4hNeZb+0HWHsnO9vvP4t6LkKF/iIGNNVNmA9ZJA94ESCfItSozIITqRE2 sJQ43X9uQhX2p/dfeyNoOJDhie0RyZyg0rPxIDNonP1YJ8kTjMMHnRNqGn9MkVYK bNr1/sdLhH0TXvs5XoL9b9YjUPL67hDHL9bHLByOKNSxXrth+TcqFX+eg7Bztn1A vS4Sc2TWCuBa3jdrS9WJiy58aB1sTABRhN+tY4wVs+A9vIr1dKHn4wsB8axmpYDW cyzVbz9Q+fC+gXwDusZccBqfD7rByEFWXflBFI4PDXRrW+NPy8w\xdb5k -----END PGP SIGNATURE-----
VAR-202005-0713 CVE-2020-3313 Cisco Firepower Management Center Cross-site scripting vulnerabilities in software CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the FMC Software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or to access sensitive, browser-based information. A cross-site scripting vulnerability exists in the Web UI in versions prior to Cisco FMC 6.2.2.3
VAR-202005-0700 CVE-2020-3285 Cisco Firepower Threat Defense Input verification vulnerabilities in software CVSS V2: 5.0
CVSS V3: 5.8
Severity: MEDIUM
A vulnerability in the Transport Layer Security version 1.3 (TLS 1.3) policy with URL category functionality for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured TLS 1.3 policy to block traffic for a specific URL. The vulnerability is due to a logic error with Snort handling of the connection with the TLS 1.3 policy and URL category configuration. An attacker could exploit this vulnerability by sending crafted TLS 1.3 connections to an affected device. A successful exploit could allow the attacker to bypass the TLS 1.3 policy and access URLs that are outside the affected device and normally would be dropped. Cisco Firepower Threat Defense (FTD) The software contains an input verification vulnerability.Information may be tampered with
VAR-202005-0708 CVE-2020-3308 Cisco Firepower Threat Defense Software Software Digital Signature Verification Vulnerability CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
A vulnerability in the Image Signature Verification feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image
VAR-202005-1001 CVE-2020-6081 3S-Smart Software Solutions GmbH CODESYS Runtime Vulnerability in inadequate validation of data reliability in CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
An exploitable code execution vulnerability exists in the PLC_Task functionality of 3S-Smart Software Solutions GmbH CODESYS Runtime 3.5.14.30. A specially crafted network request can cause remote code execution. An attacker can send a malicious packet to trigger this vulnerability. (DoS) It may be put into a state. 3S-Smart Software Solutions CODESYS Runtime is a set of controller real-time running system based on IEC61131-3 standard programming of Germany 3S-Smart Software Solutions. The system can transform any embedded or PC-based equipment into an industrial controller that conforms to the IEC61131-3 standard
VAR-202005-0696 CVE-2020-3259 Cisco Adaptive Security Appliance  and  Cisco Firepower Threat Defense  Software vulnerabilities CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve memory contents on an affected device, which could lead to the disclosure of confidential information. The vulnerability is due to a buffer tracking issue when the software parses invalid URLs that are requested from the web services interface. An attacker could exploit this vulnerability by sending a crafted GET request to the web services interface. A successful exploit could allow the attacker to retrieve memory contents, which could lead to the disclosure of confidential information. Note: This vulnerability affects only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. Cisco Adaptive Security Appliances Software is a firewall and network security platform. The platform provides features such as highly secure access to data and network resources