VARIoT IoT vulnerabilities database

VAR-202001-1554 | CVE-2020-4207 | IBM Watson IoT Message Gateway Vulnerable to classical buffer overflow |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
IBM Watson IoT Message Gateway 2.0.0.x, 5.0.0.0, 5.0.0.1, and 5.0.0.2 is vulnerable to a buffer overflow, caused by improper bounds checking when handling a failed HTTP request with specific content in the headers. By sending a specially crafted HTTP request, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause a denial of service. IBM X-Force ID: 174972. Vendors report this vulnerability IBM X-Force ID: 174972 Published as.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. IBM Watson Studio Local is a set of collaborative data processing solutions from IBM in the United States. The product includes functions such as data analysis, data visualization, data cleaning and streaming data extraction. The vulnerability is caused by incorrectly verifying the data boundary when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other memory locations associated with it. Attackers can use this vulnerability to cause buffer overflow or heap overflow
VAR-202001-1689 | CVE-2020-7997 | ASUS WRT-AC66U 3 RT Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
ASUS WRT-AC66U 3 RT 3.0.0.4.372_67 devices allow XSS via the Client Name field to the Parental Control feature. ASUS WRT-AC66U 3 RT Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. ASUS WRT-AC66U is a product of Taiwan ASUS Corporation.
A cross-site scripting vulnerability exists in ASUS WRT-AC66U. The vulnerability stems from the lack of proper validation of client data by web applications. An attacker could use this vulnerability to execute client code
VAR-202001-0883 | CVE-2013-3093 | ASUS RT-N56U Cross-site request forgery vulnerability in devices |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
ASUS RT-N56U devices allow CSRF. ASUS RT-N56U The device contains a cross-site request forgery vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state
VAR-202001-0211 | CVE-2019-4620 | IBM MQ Appliance Input Validation Error Vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
IBM MQ Appliance 8.0 and 9.0 LTS could allow a local attacker to bypass security restrictions caused by improper validation of environment variables. IBM X-Force ID: 168863. IBM MQ Appliance Contains an input validation vulnerability. Vendors report this vulnerability IBM X-Force ID: 168863 Published as.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. IBM MQ Appliance is an all-in-one device for rapid deployment of enterprise-level messaging middleware by IBM Corporation in the United States. The vulnerability stems from a network system or product that did not properly validate the input data. No detailed vulnerability details are provided at this time
VAR-202001-0383 | CVE-2019-20216 | D-Link DIR-859 In the device OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because REMOTE_PORT is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters. D-Link DIR-859 Devices include: OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-859 is a router device.
D-Link DIR-859 ssdpcgi () M-SEARCH method handles security vulnerabilities
VAR-202001-0384 | CVE-2019-20217 | D-Link DIR-859 In the device OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because SERVER_ID is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters. D-Link DIR-859 Devices include: OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-859 is a router device.
The D-Link DIR-859 ssdpcgi () M-SEARCH method handles a security vulnerability
VAR-202001-0209 | CVE-2019-4568 | IBM MQ and MQ Appliance Input validation vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: Medium |
IBM MQ and IBM MQ Appliance 8.0 and 9.0 LTS could allow a remote attacker with intimate knowledge of the server to cause a denial of service when receiving data on the channel. IBM X-Force ID: 166629. IBM MQ and MQ Appliance Contains an input validation vulnerability. Vendors report this vulnerability IBM X-Force ID: 166629 Published as.Denial of service operation (DoS) May be in a state
VAR-202001-0382 | CVE-2019-20215 | D-Link DIR-859 In the device OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via a urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because HTTP_ST is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters. D-Link DIR-859 Devices include: OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-859 is a router device.
The D-Link DIR-859 ssdpcgi () M-SEARCH method handles a security vulnerability
VAR-202001-1483 | CVE-2018-19441 | Neato Botvac Connected Vulnerability regarding the use of inadequate random values in |
CVSS V2: 1.9 CVSS V3: 4.7 Severity: MEDIUM |
An issue was discovered in Neato Botvac Connected 2.2.0. The GenerateRobotPassword function of the NeatoCrypto library generates insufficiently random numbers for robot secret_key values used for local and cloud authentication/authorization. If an attacker knows the serial number and is able to estimate the time of first provisioning of a robot, he is able to brute force the generated secret_key of the robot. This is because the entropy of the secret_key exclusively relies on these two values, due to not seeding the random generator and using several constant inputs for secret_key computation. Serial numbers are printed on the packaging and equal the MAC address of the robot
VAR-202001-1651 | CVE-2020-8087 | SMC Networks D3G0804W Vulnerabilities in devices |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
SMC Networks D3G0804W D3GNV5M-3.5.1.6.10_GA devices allow remote command execution by leveraging access to the Network Diagnostic Tools screen, as demonstrated by an admin login. The attacker must use a Parameter Pollution approach against goform/formSetDiagnosticToolsFmPing by providing the vlu_diagnostic_tools__ping_address parameter twice: once with a shell metacharacter and a command name, and once with a command argument. SMC Networks D3G0804W The device contains an unspecified vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. SMC Networks D3G0804W is a SMC network device.
The SMC Networks D3G0804W network diagnostic tool has a security vulnerability. Remote attackers can use this vulnerability to submit special requests and execute arbitrary commands
VAR-202001-0278 | CVE-2019-17094 | Belkin WeMo Insight Switch Out of boundary write vulnerability in firmware |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A Stack-based Buffer Overflow vulnerability in libbelkin_api.so component of Belkin WeMo Insight Switch firmware allows a local attacker to obtain code execution on the device. This issue affects: Belkin WeMo Insight Switch firmware version 2.00.11396 and prior versions. Belkin WeMo Insight Switch Firmware contains an out-of-bounds write vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state
VAR-202001-0283 | CVE-2019-17102 | Bitdefender BOX 2 In Time-of-check Time-of-use (TOCTOU) Race condition vulnerability |
CVSS V2: 9.3 CVSS V3: 8.1 Severity: HIGH |
An exploitable command execution vulnerability exists in the recovery partition of Bitdefender BOX 2, version 2.0.1.91. The API method `/api/update_setup` does not perform firmware signature checks atomically, leading to an exploitable race condition (TOCTTOU) that allows arbitrary execution of system commands. This issue affects: Bitdefender Bitdefender BOX 2 versions prior to 2.1.47.36. Bitdefender BOX 2 In Time-of-check Time-of-use (TOCTOU) A race condition vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Bitdefender BOX is a smart home security control device from Bitdefender in Romania. The vulnerability originates from improper design or implementation during code development of a network system or product. No detailed vulnerability details are provided at this time
VAR-202001-0808 | CVE-2019-19143 | TP-LINK TL-WR849N Authentication vulnerabilities in devices |
CVSS V2: 4.1 CVSS V3: 6.1 Severity: MEDIUM |
TP-LINK TL-WR849N 0.9.1 4.16 devices do not require authentication to replace the firmware via a POST request to the cgi/softup URI. TP-LINK TL-WR849N The device contains an authentication vulnerability.The information may be obtained and the information may be altered. TP-LINK TL-WR849N is a 300mbps WiFi router.
TP-LINK TL-WR849N version 0.9.1 4.16 has an authorization issue vulnerability. The vulnerability stems from a lack of authentication measures or insufficient authentication strength in a network system or product. No detailed vulnerability details are provided at this time
VAR-202001-0280 | CVE-2019-17096 | Bitdefender BOX 2 In OS Command injection vulnerability |
CVSS V2: 9.3 CVSS V3: 9.8 Severity: CRITICAL |
A OS Command Injection vulnerability in the bootstrap stage of Bitdefender BOX 2 allows the manipulation of the `get_image_url()` function in special circumstances to inject a system command. Bitdefender BOX is a smart home security control device from Bitdefender in Romania. The vulnerability stems from the fact that the network system or product did not properly filter the special characters, commands, etc. during the process of constructing the executable command of the operating system by external input data. An attacker could use this vulnerability to execute illegal operating system commands
VAR-202001-0590 | CVE-2019-17651 | FortiSIEM Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
An Improper Neutralization of Input vulnerability in the description and title parameters of a Device Maintenance Schedule in FortiSIEM version 5.2.5 and below may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious JavaScript code into the description field of a Device Maintenance schedule. FortiSIEM Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. Fortinet FortiSIEM is a security information and event management system developed by Fortinet Corporation. The system includes features such as asset discovery, workflow automation and unified management. A cross-site scripting vulnerability exists in Fortinet FortiSIEM 5.2.5 and earlier versions. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-202001-1192 | CVE-2020-3129 | Cisco Unity Connection Cross-site scripting vulnerability in software |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Unity Connection Software could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by providing crafted data to a specific field within the interface. A successful exploit could allow the attacker to store an XSS attack within the interface. This stored XSS attack would then be executed on the system of any user viewing the attacker-supplied data element. Cisco Unity Connection (UC) is a set of voice message platform of Cisco (Cisco). The platform can utilize voice commands to make calls or listen to messages hands-free
VAR-202001-1194 | CVE-2020-3134 | Cisco Email Security Appliance Input validation vulnerability |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of zip files. An attacker could exploit this vulnerability by sending an email message with a crafted zip-compressed attachment. A successful exploit could trigger a restart of the content-scanning process, causing a temporary DoS condition. This vulnerability affects Cisco AsyncOS Software for Cisco ESA releases earlier than 13.0. AsyncOS Software is a set of operating systems running on it
VAR-202001-0494 | CVE-2019-16027 | Cisco IOS XR Input validation vulnerability in software |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the implementation of the Intermediate System–to–Intermediate System (IS–IS) routing protocol functionality in Cisco IOS XR Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition in the IS–IS process. The vulnerability is due to improper handling of a Simple Network Management Protocol (SNMP) request for specific Object Identifiers (OIDs) by the IS–IS process. An attacker could exploit this vulnerability by sending a crafted SNMP request to the affected device. A successful exploit could allow the attacker to cause a DoS condition in the IS–IS process. Cisco IOS XR is an operating system developed by Cisco for its network equipment. The following products and versions are affected: Cisco IOS XR prior to 6.6.3, prior to 7.0.2, prior to 7.1.1, and prior to 7.2.1
VAR-202001-1196 | CVE-2020-3139 | Cisco Application Policy Infrastructure Controller Input validation vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the out of band (OOB) management interface IP table rule programming for Cisco Application Policy Infrastructure Controller (APIC) could allow an unauthenticated, remote attacker to bypass configured deny entries for specific IP ports. These IP ports would be permitted to the OOB management interface when, in fact, the packets should be dropped. The vulnerability is due to the configuration of specific IP table entries for which there is a programming logic error that results in the IP port being permitted. An attacker could exploit this vulnerability by sending traffic to the OOB management interface on the targeted device. A successful exploit could allow the attacker to bypass configured IP table rules to drop specific IP port traffic. The attacker has no control over the configuration of the device itself. This vulnerability affects Cisco APIC releases prior to the first fixed software Release 4.2(3j). Cisco Application Policy Infrastructure Controller (APIC) Contains an input validation vulnerability.Information may be altered
VAR-202001-1195 | CVE-2020-3136 | Cisco Jabber Guest Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Jabber Guest could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability exists because the web-based management interface of the affected device does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information. This vulnerability affects Cisco Jabber Guest releases 11.1(2) and earlier. Cisco Jabber Guest Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified