VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202001-1554 CVE-2020-4207 IBM Watson IoT Message Gateway  Vulnerable to classical buffer overflow CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
IBM Watson IoT Message Gateway 2.0.0.x, 5.0.0.0, 5.0.0.1, and 5.0.0.2 is vulnerable to a buffer overflow, caused by improper bounds checking when handling a failed HTTP request with specific content in the headers. By sending a specially crafted HTTP request, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause a denial of service. IBM X-Force ID: 174972. Vendors report this vulnerability IBM X-Force ID: 174972 Published as.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. IBM Watson Studio Local is a set of collaborative data processing solutions from IBM in the United States. The product includes functions such as data analysis, data visualization, data cleaning and streaming data extraction. The vulnerability is caused by incorrectly verifying the data boundary when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other memory locations associated with it. Attackers can use this vulnerability to cause buffer overflow or heap overflow
VAR-202001-1689 CVE-2020-7997 ASUS WRT-AC66U 3 RT  Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
ASUS WRT-AC66U 3 RT 3.0.0.4.372_67 devices allow XSS via the Client Name field to the Parental Control feature. ASUS WRT-AC66U 3 RT Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. ASUS WRT-AC66U is a product of Taiwan ASUS Corporation. A cross-site scripting vulnerability exists in ASUS WRT-AC66U. The vulnerability stems from the lack of proper validation of client data by web applications. An attacker could use this vulnerability to execute client code
VAR-202001-0883 CVE-2013-3093 ASUS RT-N56U  Cross-site request forgery vulnerability in devices CVSS V2: 9.3
CVSS V3: 8.8
Severity: HIGH
ASUS RT-N56U devices allow CSRF. ASUS RT-N56U The device contains a cross-site request forgery vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state
VAR-202001-0211 CVE-2019-4620 IBM MQ Appliance Input Validation Error Vulnerability CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
IBM MQ Appliance 8.0 and 9.0 LTS could allow a local attacker to bypass security restrictions caused by improper validation of environment variables. IBM X-Force ID: 168863. IBM MQ Appliance Contains an input validation vulnerability. Vendors report this vulnerability IBM X-Force ID: 168863 Published as.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. IBM MQ Appliance is an all-in-one device for rapid deployment of enterprise-level messaging middleware by IBM Corporation in the United States. The vulnerability stems from a network system or product that did not properly validate the input data. No detailed vulnerability details are provided at this time
VAR-202001-0383 CVE-2019-20216 D-Link DIR-859  In the device  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because REMOTE_PORT is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters. D-Link DIR-859 Devices include: OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-859 is a router device. D-Link DIR-859 ssdpcgi () M-SEARCH method handles security vulnerabilities
VAR-202001-0384 CVE-2019-20217 D-Link DIR-859  In the device  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because SERVER_ID is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters. D-Link DIR-859 Devices include: OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-859 is a router device. The D-Link DIR-859 ssdpcgi () M-SEARCH method handles a security vulnerability
VAR-202001-0209 CVE-2019-4568 IBM MQ  and  MQ Appliance  Input validation vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: Medium
IBM MQ and IBM MQ Appliance 8.0 and 9.0 LTS could allow a remote attacker with intimate knowledge of the server to cause a denial of service when receiving data on the channel. IBM X-Force ID: 166629. IBM MQ and MQ Appliance Contains an input validation vulnerability. Vendors report this vulnerability IBM X-Force ID: 166629 Published as.Denial of service operation (DoS) May be in a state
VAR-202001-0382 CVE-2019-20215 D-Link DIR-859  In the device  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via a urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because HTTP_ST is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters. D-Link DIR-859 Devices include: OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-859 is a router device. The D-Link DIR-859 ssdpcgi () M-SEARCH method handles a security vulnerability
VAR-202001-1483 CVE-2018-19441 Neato Botvac Connected Vulnerability regarding the use of inadequate random values in CVSS V2: 1.9
CVSS V3: 4.7
Severity: MEDIUM
An issue was discovered in Neato Botvac Connected 2.2.0. The GenerateRobotPassword function of the NeatoCrypto library generates insufficiently random numbers for robot secret_key values used for local and cloud authentication/authorization. If an attacker knows the serial number and is able to estimate the time of first provisioning of a robot, he is able to brute force the generated secret_key of the robot. This is because the entropy of the secret_key exclusively relies on these two values, due to not seeding the random generator and using several constant inputs for secret_key computation. Serial numbers are printed on the packaging and equal the MAC address of the robot
VAR-202001-1651 CVE-2020-8087 SMC Networks D3G0804W  Vulnerabilities in devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
SMC Networks D3G0804W D3GNV5M-3.5.1.6.10_GA devices allow remote command execution by leveraging access to the Network Diagnostic Tools screen, as demonstrated by an admin login. The attacker must use a Parameter Pollution approach against goform/formSetDiagnosticToolsFmPing by providing the vlu_diagnostic_tools__ping_address parameter twice: once with a shell metacharacter and a command name, and once with a command argument. SMC Networks D3G0804W The device contains an unspecified vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. SMC Networks D3G0804W is a SMC network device. The SMC Networks D3G0804W network diagnostic tool has a security vulnerability. Remote attackers can use this vulnerability to submit special requests and execute arbitrary commands
VAR-202001-0278 CVE-2019-17094 Belkin WeMo Insight Switch  Out of boundary write vulnerability in firmware CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A Stack-based Buffer Overflow vulnerability in libbelkin_api.so component of Belkin WeMo Insight Switch firmware allows a local attacker to obtain code execution on the device. This issue affects: Belkin WeMo Insight Switch firmware version 2.00.11396 and prior versions. Belkin WeMo Insight Switch Firmware contains an out-of-bounds write vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state
VAR-202001-0283 CVE-2019-17102 Bitdefender BOX 2  In Time-of-check Time-of-use (TOCTOU)  Race condition vulnerability CVSS V2: 9.3
CVSS V3: 8.1
Severity: HIGH
An exploitable command execution vulnerability exists in the recovery partition of Bitdefender BOX 2, version 2.0.1.91. The API method `/api/update_setup` does not perform firmware signature checks atomically, leading to an exploitable race condition (TOCTTOU) that allows arbitrary execution of system commands. This issue affects: Bitdefender Bitdefender BOX 2 versions prior to 2.1.47.36. Bitdefender BOX 2 In Time-of-check Time-of-use (TOCTOU) A race condition vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Bitdefender BOX is a smart home security control device from Bitdefender in Romania. The vulnerability originates from improper design or implementation during code development of a network system or product. No detailed vulnerability details are provided at this time
VAR-202001-0808 CVE-2019-19143 TP-LINK TL-WR849N  Authentication vulnerabilities in devices CVSS V2: 4.1
CVSS V3: 6.1
Severity: MEDIUM
TP-LINK TL-WR849N 0.9.1 4.16 devices do not require authentication to replace the firmware via a POST request to the cgi/softup URI. TP-LINK TL-WR849N The device contains an authentication vulnerability.The information may be obtained and the information may be altered. TP-LINK TL-WR849N is a 300mbps WiFi router. TP-LINK TL-WR849N version 0.9.1 4.16 has an authorization issue vulnerability. The vulnerability stems from a lack of authentication measures or insufficient authentication strength in a network system or product. No detailed vulnerability details are provided at this time
VAR-202001-0280 CVE-2019-17096 Bitdefender BOX 2  In  OS  Command injection vulnerability CVSS V2: 9.3
CVSS V3: 9.8
Severity: CRITICAL
A OS Command Injection vulnerability in the bootstrap stage of Bitdefender BOX 2 allows the manipulation of the `get_image_url()` function in special circumstances to inject a system command. Bitdefender BOX is a smart home security control device from Bitdefender in Romania. The vulnerability stems from the fact that the network system or product did not properly filter the special characters, commands, etc. during the process of constructing the executable command of the operating system by external input data. An attacker could use this vulnerability to execute illegal operating system commands
VAR-202001-0590 CVE-2019-17651 FortiSIEM  Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
An Improper Neutralization of Input vulnerability in the description and title parameters of a Device Maintenance Schedule in FortiSIEM version 5.2.5 and below may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious JavaScript code into the description field of a Device Maintenance schedule. FortiSIEM Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. Fortinet FortiSIEM is a security information and event management system developed by Fortinet Corporation. The system includes features such as asset discovery, workflow automation and unified management. A cross-site scripting vulnerability exists in Fortinet FortiSIEM 5.2.5 and earlier versions. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-202001-1192 CVE-2020-3129 Cisco Unity Connection  Cross-site scripting vulnerability in software CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Unity Connection Software could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by providing crafted data to a specific field within the interface. A successful exploit could allow the attacker to store an XSS attack within the interface. This stored XSS attack would then be executed on the system of any user viewing the attacker-supplied data element. Cisco Unity Connection (UC) is a set of voice message platform of Cisco (Cisco). The platform can utilize voice commands to make calls or listen to messages hands-free
VAR-202001-1194 CVE-2020-3134 Cisco Email Security Appliance  Input validation vulnerability CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of zip files. An attacker could exploit this vulnerability by sending an email message with a crafted zip-compressed attachment. A successful exploit could trigger a restart of the content-scanning process, causing a temporary DoS condition. This vulnerability affects Cisco AsyncOS Software for Cisco ESA releases earlier than 13.0. AsyncOS Software is a set of operating systems running on it
VAR-202001-0494 CVE-2019-16027 Cisco IOS XR  Input validation vulnerability in software CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
A vulnerability in the implementation of the Intermediate System–to–Intermediate System (IS–IS) routing protocol functionality in Cisco IOS XR Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition in the IS–IS process. The vulnerability is due to improper handling of a Simple Network Management Protocol (SNMP) request for specific Object Identifiers (OIDs) by the IS–IS process. An attacker could exploit this vulnerability by sending a crafted SNMP request to the affected device. A successful exploit could allow the attacker to cause a DoS condition in the IS–IS process. Cisco IOS XR is an operating system developed by Cisco for its network equipment. The following products and versions are affected: Cisco IOS XR prior to 6.6.3, prior to 7.0.2, prior to 7.1.1, and prior to 7.2.1
VAR-202001-1196 CVE-2020-3139 Cisco Application Policy Infrastructure Controller  Input validation vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A vulnerability in the out of band (OOB) management interface IP table rule programming for Cisco Application Policy Infrastructure Controller (APIC) could allow an unauthenticated, remote attacker to bypass configured deny entries for specific IP ports. These IP ports would be permitted to the OOB management interface when, in fact, the packets should be dropped. The vulnerability is due to the configuration of specific IP table entries for which there is a programming logic error that results in the IP port being permitted. An attacker could exploit this vulnerability by sending traffic to the OOB management interface on the targeted device. A successful exploit could allow the attacker to bypass configured IP table rules to drop specific IP port traffic. The attacker has no control over the configuration of the device itself. This vulnerability affects Cisco APIC releases prior to the first fixed software Release 4.2(3j). Cisco Application Policy Infrastructure Controller (APIC) Contains an input validation vulnerability.Information may be altered
VAR-202001-1195 CVE-2020-3136 Cisco Jabber Guest  Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Jabber Guest could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability exists because the web-based management interface of the affected device does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information. This vulnerability affects Cisco Jabber Guest releases 11.1(2) and earlier. Cisco Jabber Guest Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified