VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201911-0494 CVE-2019-15425 Kata M4s Android Vulnerability related to externally controllable references to other domain resources on devices CVSS V2: 2.1
CVSS V3: 3.3
Severity: LOW
The Kata M4s Android device with a build fingerprint of alps/full_hct6750_66_n/hct6750_66_n:7.0/NRD90M/1495624556:user/test-keys contains a pre-installed app with a package name of com.mediatek.factorymode app (versionCode=1, versionName=1) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device. Kata M4s Android The device is vulnerable to an externally controllable reference to another realm resource.Information may be tampered with. Kata M4s is a smartphone. The com.mediatek.factorymode app in Kata M4s (build fingerprint: alps / full_hct6750_66_n / hct6750_66_n: 7.0 / NRD90M / 1495624556: user / test-keys) has a security vulnerability. This vulnerability could be used by an attacker to unauthorizedly modify wireless settings by other applications on the device
VAR-201911-0440 CVE-2019-15475 Xiaomi Mi A3 Access Control Error Vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
The Xiaomi Mi A3 Android device with a build fingerprint of xiaomi/onc_eea/onc:9/PKQ1.181021.001/V10.2.8.0.PFLEUXM:user/release-keys contains a pre-installed app with a package name of com.qualcomm.qti.callenhancement app (versionCode=28, versionName=9) that allows unauthorized microphone audio recording via a confused deputy attack. This capability can be accessed by any app co-located on the device. This app allows a third-party app to use its open interface to record telephone calls to external storage. Xiaomi Mi A3 Android The device is vulnerable to an externally controllable reference to another realm resource.Information may be obtained. Xiaomi Mi A3 is a smartphone from China Xiaomi Technology. The access control error vulnerability exists in the com.qualcomm.qti.callenhancement app in Xiaomi Mi A3 (build fingerprint:xiaomi/onc_eea/onc:9/PKQ1.181021.001/V10.2.8.0.PFLEUXM:user/release-keys). An attacker could use the vulnerability to make unauthorized microphone recordings with third-party software
VAR-201911-0476 CVE-2019-15407 ASUS ASUS_X015_1 Access Control Error Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
The Asus ASUS_X015_1 Android device with a build fingerprint of asus/CN_X015/ASUS_X015_1:7.0/NRD90M/CN_X015-14.00.1709.35-20171215:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000015, versionName=7.0.0.3_161222) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Asus ASUS_X015_1 Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUS ASUS_X015_1 is a smartphone from ASUS, Taiwan. ASUS ASUS_X015_1 has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to execute commands through an accessible application component
VAR-201911-0468 CVE-2019-15399 Asus ZenFone 5Q Android Vulnerability with improper permission assignment to critical resources on devices CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
The Asus ZenFone 5Q Android device with a build fingerprint of asus/WW_Phone/ASUS_X017D_2:7.1.1/NGI77B/14.0400.1809.059-20181016:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Asus ZenFone 5Q Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUS ZenFone 5Q is a smartphone from ASUS, Taiwan. ASUS ZenFone 5Q has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to execute commands through an accessible application component
VAR-201911-0526 CVE-2019-15361 Infinix Note 5 Android Lack of authentication on device CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
The Infinix Note 5 Android device with a build fingerprint of Infinix/H632C/Infinix-X605_sprout:8.1.0/O11019/CE-180914V59:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. Infinix Note 5 Android The device is vulnerable to a lack of authentication.Information may be tampered with. Infinix Note 5 is a smartphone from China Transsion Corporation. Infinix Note 5 has an unknown vulnerability. An attacker could use this vulnerability to modify system properties
VAR-201911-1049 CVE-2019-18241 Philips IntelliBridge EC40 and EC80 Vulnerabilities related to cryptographic strength CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
In Philips IntelliBridge EC40 and EC80, IntelliBridge EC40 Hub all versions, and IntelliBridge EC80 Hub all versions, the SSH server running on the affected products is configured to allow weak ciphers. This could enable an unauthorized attacker with access to the network to capture and replay the session and gain unauthorized access to the EC40/80 hub. Philips IntelliBridge EC40 and EC80 Contains a cryptographic strength vulnerability.Information may be obtained. The Philips IntelliBridge EC40 Hub and IntelliBridge EC80 Hub are both a monitor module from Philips, Europe
VAR-201911-0562 CVE-2019-15446 Samsung S7 Android Vulnerability with improper permission assignment to critical resources on devices CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
The Samsung S7 Android device with a build fingerprint of samsung/heroltexx/herolte:8.0.0/R16NW/G930FXXU3ESAC:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000000, versionName=7.0.0.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Samsung S7 Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Samsung J7 Duo is a smartphone from Samsung in South Korea. An access control error vulnerability exists in com.samsung.android.themecenter app in Samsung J7 Duo (build fingerprint: samsung / j7duolteub / j7duolte: 8.0.0 / R16NW / J720MUBS3ASB2: user / release-keys). The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. No detailed vulnerability details are provided at this time
VAR-201911-0502 CVE-2019-15337 Lava Z81 Android Vulnerability with improper permission assignment to critical resources on devices CVSS V2: 2.1
CVSS V3: 3.3
Severity: LOW
The Lava Z81 Android device with a build fingerprint of LAVA/Z81/Z81:8.1.0/O11019/1532317309:user/release-keys contains a pre-installed app with a package name of com.android.lava.powersave app (versionCode=400, versionName=v4.0.31) that allows any app co-located on the device to programmatically disable and enable Wi-Fi without the corresponding access permission through an exported interface. Lava Z81 Android Devices are vulnerable to improper assignment of permissions to critical resources.Information may be tampered with. Lava Z81 is a smartphone from Lava company in India. Lava Z81 has an unknown vulnerability. An attacker could use this vulnerability to unauthorizedly switch Wi-Fi on
VAR-201911-0470 CVE-2019-15401 ASUS ASUS_A002 Access Control Error Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
The Asus ASUS_A002 Android device with a build fingerprint of asus/WW_ASUS_A002/ASUS_A002:7.0/NRD90M/14.1600.1805.51-20180626:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Asus ASUS_A002_2 Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUS ASUS_A002 is a smart phone from Taiwan ASUS. ASUS ASUS_A002 has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to execute commands through an accessible application component
VAR-201911-0527 CVE-2019-15362 Lava Iris 88 Go Android Lack of authentication on device CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
The Lava Iris 88 Go Android device with a build fingerprint of LAVA/iris88_go/iris88_go:8.1.0/O11019/1538188945:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. Lava Iris 88 Go Android The device is vulnerable to a lack of authentication.Information may be tampered with. Lava Iris 88 Go is a smartphone from Lava, India. Lava Iris 88 Go has an unknown vulnerability. An attacker could use this vulnerability to modify system properties
VAR-201911-0555 CVE-2019-15439 Samsung XCover4 Android Vulnerability with improper permission assignment to critical resources on devices CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
The Samsung XCover4 Android device with a build fingerprint of samsung/xcover4ltedo/xcover4lte:8.1.0/M1AJQ/G390YDXU2BSA1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100, versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Samsung XCover4 Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Samsung XCover4 is a smartphone from Samsung in South Korea. Samsung XCover4 has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to perform application installation through an accessible application component
VAR-201911-0472 CVE-2019-15403 ASUS ZenFone 3s Max Access Control Error Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
The Asus ZenFone 3s Max Android device with a build fingerprint of asus/IN_X00G/ASUS_X00G_1:7.0/NRD90M/IN_X00G-14.02.1807.33-20180706:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Asus ZenFone 3s Max Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUS ZenFone 3s Max is a smartphone from ASUS, Taiwan. ASUS ZenFone 3s Max has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to execute commands through an accessible application component
VAR-201911-0523 CVE-2019-15358 Dexp Z250 Android Lack of authentication on device CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
The Dexp Z250 Android device with a build fingerprint of DEXP/Z250/Z250:8.1.0/O11019/1531130719:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. Dexp Z250 Android The device is vulnerable to a lack of authentication.Information may be tampered with. Dexp Z250 is a smartphone. Dexp Z250 has an unknown vulnerability. An attacker could use this vulnerability to modify system properties
VAR-201911-0495 CVE-2019-15426 Xiaomi 5S Plus Access Control Error Vulnerability CVSS V2: 2.1
CVSS V3: 3.3
Severity: LOW
The Xiaomi 5S Plus Android device with a build fingerprint of Xiaomi/natrium/natrium:6.0.1/MXB48T/7.1.5:user/release-keys contains a pre-installed app with a package name of com.miui.powerkeeper app (versionCode=40000, versionName=4.0.00) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device. Xiaomi 5S Plus Android The device is vulnerable to an externally controllable reference to another realm resource.Information may be tampered with. Xiaomi 5S Plus is a smart phone from Xiaomi of China. The com.miui.powerkeeper app in Xiaomi 5S Plus (build fingerprint: Xiaomi / natrium / natrium: 6.0.1 / MXB48T / 7.1.5: user / release-keys) has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. No detailed vulnerability details are provided at this time
VAR-201911-0477 CVE-2019-15408 ASUS ZenFone 5 Lite Access Control Error Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
The Asus ZenFone 5 Lite Android device with a build fingerprint of asus/WW_Phone/ASUS_X017D_1:7.1.1/NMF26F/14.0400.1810.061-20181107:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Asus ZenFone 5 Lite Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUS ZenFone 5 Lite is a smartphone from ASUS, Taiwan. ASUS ZenFone 5 Lite has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to execute commands through an accessible application component
VAR-201911-0531 CVE-2019-15366 Infinix Note 5 Access Control Error Vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
The Infinix Note 5 Android device with a build fingerprint of Infinix/H633IJL/Infinix-X604_sprout:8.1.0/O11019/IJL-180531V181:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. Infinix Note 5 Android The device is vulnerable to a lack of authentication.Information may be tampered with. Infinix Note 5 is a smartphone from China's Infinix. An access control error vulnerability exists in the com.mediatek.wfo.impl app in Infinix Note 5 (build fingerprint: Infinix/H633IJL/Infinix-X604_sprout: 8.1.0/O11019/IJL-180531V181: user/release-keys). The vulnerability stems from a network system or product that does not properly restrict access to resources from unauthorized roles
VAR-201911-0486 CVE-2019-15417 Tecno Spark Pro Android Vulnerability with improper permission assignment to critical resources on devices CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
The Tecno Spark Pro Android device with a build fingerprint of TECNO/H3722/TECNO-K8:7.0/NRD90M/K8-H3722ABCDE-N-171229V96:user/release-keys contains a pre-installed app with a package name of com.lovelyfont.defcontainer app (versionCode=7, versionName=7.0.5) that allows unauthorized dynamic code loading via a confused deputy attack. This capability can be accessed by any app co-located on the device. Tecno Spark Pro Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Tecno Spark Pro is a smartphone. Tecno Spark Pro has an unknown vulnerability. An attacker could use this vulnerability to unauthorizedly load dynamic code
VAR-201911-0580 CVE-2019-15464 Samsung J7 Pro Android Vulnerability with improper permission assignment to critical resources on devices CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
The Samsung J7 Pro Android device with a build fingerprint of samsung/j7y17lteub/j7y17lte:8.1.0/M1AJQ/J730GUBS6BSC1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100, versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Samsung J7 Pro Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Samsung J7 Pro is a smartphone from Samsung in South Korea. Samsung J7 Pro has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to perform application installation through an accessible application component
VAR-201911-1312 CVE-2019-15800 Zyxel GS1900 Vulnerability related to input validation in device firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the firmware, an attacker could leverage these functions to call system() and execute arbitrary commands on the switches. (Note that these functions are currently not called in this version of the firmware, however an attacker could use other vulnerabilities to finally use these vulnerabilities to gain code execution.). Zyxel GS1900 There is an input validation vulnerability in the device firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The ZyXEL GS1900 is a managed switch from ZyXEL, Taiwan. A security vulnerability exists in Zyxel GS1900 using firmware version 2.50 (AAHH.0) prior to C0, which is due to missing input in the 'cmd_sys_traceroute_exec()', 'cmd_sys_arp_clear()', and 'cmd_sys_ping_exec()' functions in the libclicmd.so library Verification check. An attacker could exploit this vulnerability to execute arbitrary code on the switch
VAR-201911-0541 CVE-2019-15376 Panasonic Eluga Ray 530 Access Control Error Vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
The Panasonic Eluga Ray 530 Android device with a build fingerprint of Panasonic/ELUGA_Ray_530/ELUGA_Ray_530:8.1.0/O11019/1531828974:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. Panasonic Eluga Ray 530 Android The device is vulnerable to a lack of authentication.Information may be tampered with. Panasonic Eluga Ray 530 is a smart phone from Japan's Panasonic. An attacker could use this vulnerability to modify system properties