VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201909-0907 CVE-2019-16924 Nulock Vulnerabilities related to clear transmission of important information in applications CVSS V2: 3.3
CVSS V3: 8.8
Severity: HIGH
The Nulock application 1.5.0 for mobile devices sends a cleartext password over Bluetooth, which allows remote attackers (after sniffing the network) to take control of the lock. Nulock The application contains a vulnerability in the transmission of important information in clear text.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
VAR-201909-0018 CVE-2019-4141 IBM MQ Vulnerable to resource exhaustion CVSS V2: 4.0
CVSS V3: 6.5
Severity: Medium
IBM MQ 7.1.0.0 - 7.1.0.9, 7.5.0.0 - 7.5.0.9, 8.0.0.0 - 8.0.0.11, 9.0.0.0 - 9.0.0.6, 9.1.0.0 - 9.1.0.2, and 9.1.1 - 9.1.2 is vulnerable to a denial of service attack caused by a memory leak in the clustering code. IBM X-Force ID: 158337. IBM MQ Contains a resource exhaustion vulnerability. Vendors have confirmed this vulnerability IBM X-Force ID: 158337 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state
VAR-201909-1662 No CVE Arbitrary File Read Vulnerability in New Core Load Balancing Device CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Zhejiang Nuclear New Flush Network Information Co., Ltd. is the first listed company in the Internet financial information service industry in China. An arbitrary file reading vulnerability exists in the nuclear new load balancing device, and an attacker can use the vulnerability to read arbitrary files.
VAR-201909-1547 No CVE Kunlun's MCGS touch screen TPC1062Ti system has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
MCGS is a Windows-based configuration software system developed by Beijing Kunlun Tongstate Automation Software Technology Co., Ltd., which is used to quickly construct and generate a host computer monitoring system. It mainly completes field data collection and monitoring, front-end data processing and control. Kunlun's MCGS touch screen TPC1062Ti system has a denial of service vulnerability. Attackers can use the vulnerability to send special messages, which can cause the MCGS touch screen system to run out of memory and cause applications to become unresponsive, resulting in a denial of service
VAR-201909-0164 CVE-2019-12654 Cisco IOS and IOS XE In software NULL Pointer dereference vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the common Session Initiation Protocol (SIP) library of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient sanity checks on an internal data structure. An attacker could exploit this vulnerability by sending a sequence of malicious SIP messages to an affected device. An exploit could allow the attacker to cause a NULL pointer dereference, resulting in a crash of the iosd process. This triggers a reload of the device. Cisco IOS and IOS XE The software includes NULL A vulnerability related to pointer dereference exists.Service operation interruption (DoS) There is a possibility of being put into a state. Both Cisco IOS and IOS XE are a set of operating systems developed by Cisco for its network equipment
VAR-201909-0166 CVE-2019-12656 plural Cisco Input validation vulnerability in the platform CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the IOx application environment of multiple Cisco platforms could allow an unauthenticated, remote attacker to cause the IOx web server to stop processing HTTPS requests, resulting in a denial of service (DoS) condition. The vulnerability is due to a Transport Layer Security (TLS) implementation issue. An attacker could exploit this vulnerability by sending crafted TLS packets to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing HTTPS requests, resulting in a DoS condition. plural Cisco The platform contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco Industrial Routers Operating System Software, etc. are all products of Cisco (Cisco). Industrial Routers Operating System Software is an operating system for routers. CGR 1000 IOx Compute Platform Firmware is a set of firmware for CGR 1000 computing modules. Industrial Compute Gateway Software is an operating system for Cisco Compute Gateway products. The following products and versions are affected: Industrial Routers Operating System Software (Cisco 510 WPAN Industrial Router); CGR 1000 IOx Compute Platform Firmware (Cisco CGR 1000 Compute Module); Industrial Compute Gateway Software (Cisco IC3000 Industrial Compute Gateway); Cisco Software (IOS Cisco Industrial Ethernet 4000 Series Switches)
VAR-201909-0162 CVE-2019-12652 Cisco IOS Software depletion vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the ingress packet processing function of Cisco IOS Software for Cisco Catalyst 4000 Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource allocation when processing TCP packets directed to the device on specific Cisco Catalyst 4000 Series Switches. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device. A successful exploit could cause the affected device to run out of buffer resources, impairing operations of control plane and management plane protocols, resulting in a DoS condition. This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device. Cisco IOS The software is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. The following products and versions are affected: Cisco Catalyst 4500 Supervisor Engine 6-E; Catalyst 4500 Supervisor Engine 6L-E; Catalyst 4900M Switch; Catalyst 4948E Ethernet Switch; Catalyst 4948E-F Ethernet Switch
VAR-201909-0168 CVE-2019-12658 Cisco IOS XE Software depletion vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the filesystem resource management code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to exhaust filesystem resources on an affected device and cause a denial of service (DoS) condition. The vulnerability is due to ineffective management of the underlying filesystem resources. An attacker could exploit this vulnerability by performing specific actions that result in messages being sent to specific operating system log files. A successful exploit could allow the attacker to exhaust available filesystem space on an affected device. This could cause the device to crash and reload, resulting in a DoS condition for clients whose network traffic is transiting the device. Upon reload of the device, the impacted filesystem space is cleared, and the device will return to normal operation. However, continued exploitation of this vulnerability could cause subsequent forced crashes and reloads, which could lead to an extended DoS condition. Cisco IOS XE The software is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco IOS XE is an operating system developed by Cisco for its network equipment
VAR-201909-0163 CVE-2019-12653 Cisco ASR 900 Cisco IOS XE Input Validation Error Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the Raw Socket Transport feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper parsing of Raw Socket Transport payloads. An attacker could exploit this vulnerability by establishing a TCP session and then sending a malicious TCP segment via IPv4 to an affected device. This cannot be exploited via IPv6, as the Raw Socket Transport feature does not support IPv6 as a network layer protocol. Cisco IOS XE The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco ASR 900 is a 900 series aggregation service router of Cisco Company in the United States. Cisco IOS XE is an operating system developed for Cisco network equipment. The TCP fragment exploited this vulnerability to cause a denial of service
VAR-201909-0165 CVE-2019-12655 Cisco IOS XE Classic buffer overflow vulnerability in software CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the FTP application layer gateway (ALG) functionality used by Network Address Translation (NAT), NAT IPv6 to IPv4 (NAT64), and the Zone-Based Policy Firewall (ZBFW) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a buffer overflow that occurs when an affected device inspects certain FTP traffic. An attacker could exploit this vulnerability by performing a specific FTP transfer through the device. A successful exploit could allow the attacker to cause the device to reload. Cisco IOS XE The software contains a classic buffer overflow vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco IOS XE is an operating system developed by Cisco for its network equipment
VAR-201909-0169 CVE-2019-12659 Cisco IOS XE Software input validation vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the HTTP server code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the HTTP server to crash. The vulnerability is due to a logical error in the logging mechanism. An attacker could exploit this vulnerability by generating a high amount of long-lived connections to the HTTP service on the device. A successful exploit could allow the attacker to cause the HTTP server to crash. Cisco IOS XE The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco IOS XE is an operating system developed by Cisco for its network equipment
VAR-201909-0167 CVE-2019-12657 Cisco IOS XE Software input validation vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability in Unified Threat Defense (UTD) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to improper validation of IPv6 packets through the UTD feature. An attacker could exploit this vulnerability by sending IPv6 traffic through an affected device that is configured with UTD. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition. Cisco IOS XE The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state
VAR-201909-0178 CVE-2019-12664 Cisco IOS XE Software authentication vulnerabilities CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the Dialer interface feature for ISDN connections in Cisco IOS XE Software for Cisco 4000 Series Integrated Services Routers (ISRs) could allow an unauthenticated, adjacent attacker to pass IPv4 traffic through an ISDN channel prior to successful PPP authentication. The vulnerability is due to insufficient validation of the state of the PPP IP Control Protocol (IPCP). An attacker could exploit this vulnerability by making an ISDN call to an affected device and sending traffic through the ISDN channel prior to successful PPP authentication. Alternatively, an unauthenticated, remote attacker could exploit this vulnerability by sending traffic through an affected device that is configured to exit via an ISDN connection for which both the Dialer interface and the Basic Rate Interface (BRI) have been configured, but the Challenge Handshake Authentication Protocol (CHAP) password for PPP does not match the remote end. A successful exploit could allow the attacker to pass IPv4 traffic through an unauthenticated ISDN connection for a few seconds, from initial ISDN call setup until PPP authentication fails. Cisco IOS XE There is an authentication vulnerability in the software.Information may be tampered with. Cisco 4000 Series Integrated Services Routers is a 4000 series enterprise-class multi-service router produced by Cisco (Cisco)
VAR-201909-0180 CVE-2019-12667 Cisco IOS XE Software cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
A vulnerability in the web framework code of Cisco IOS XE Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected software. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected software. An attacker could exploit this vulnerability by convincing a user of the web interface to access a malicious link or by intercepting a user request for the affected web interface and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information
VAR-201909-0181 CVE-2019-12668 Cisco IOS and Cisco IOS XE Software cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
A vulnerability in the web framework code of Cisco IOS and Cisco IOS XE Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected software using the banner parameter. The vulnerability is due to insufficient input validation of the banner parameters that are passed to the web server of the affected software. An attacker could exploit this vulnerability by crafting a banner parameter and saving it. The attacker could then convince a user of the web interface to access a malicious link or could intercept a user request for the affected web interface and inject malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information
VAR-201909-0172 CVE-2019-12661 Cisco IOS XE In software OS Command injection vulnerability CVSS V2: 7.2
CVSS V3: 6.7
Severity: MEDIUM
A vulnerability in a Virtualization Manager (VMAN) related CLI command of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with a privilege level of root. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on the affected device. An attacker who has administrator access to an affected device could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges, which may lead to complete system compromise. Cisco IOS XE The software includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco IOS XE is an operating system developed by Cisco for its network equipment
VAR-201909-0177 CVE-2019-12663 Cisco IOS XE Software input validation vulnerability CVSS V2: 7.8
CVSS V3: 8.6
Severity: HIGH
A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of attributes in RADIUS messages. An attacker could exploit this vulnerability by sending a malicious RADIUS message to an affected device while the device is in a specific state. Cisco IOS XE The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco IOS XE is an operating system developed by Cisco for its network equipment
VAR-201909-0171 CVE-2019-12660 Cisco IOS XE Software input validation vulnerability CVSS V2: 4.9
CVSS V3: 5.5
Severity: MEDIUM
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to write values to the underlying memory of an affected device. The vulnerability is due to improper input validation and authorization of specific commands that a user can execute within the CLI. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to modify the configuration of the device to cause it to be non-secure and abnormally functioning. Cisco IOS XE The software contains an input validation vulnerability.Information may be tampered with. The vulnerability stems from the fact that the program does not properly authenticate and authorize some commands
VAR-201909-0179 CVE-2019-12666 Cisco IOS XE Software path traversal vulnerability CVSS V2: 7.2
CVSS V3: 6.7
Severity: MEDIUM
A vulnerability in the Guest Shell of Cisco IOS XE Software could allow an authenticated, local attacker to perform directory traversal on the base Linux operating system of Cisco IOS XE Software. The vulnerability is due to incomplete validation of certain commands. An attacker could exploit this vulnerability by first accessing the Guest Shell and then entering specific commands. A successful exploit could allow the attacker to execute arbitrary code on the base Linux operating system
VAR-201909-0200 CVE-2019-12717 Cisco NX-OS Software Operating System Command Injection Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A vulnerability in a CLI command related to the virtualization manager (VMAN) in Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on an affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges, which may lead to complete system compromise. An attacker would need valid administrator credentials to exploit this vulnerability. Cisco NX-OS The software includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Nexus 3000 Series Switches, etc. are the products of the United States Cisco. Cisco Nexus 3000 Series Switches is a 3000 series switch. Cisco Nexus 3500 Platform Switches is a 3500 series platform switch. Cisco Nexus 3600 Platform Switches is a 3600 series platform switch. Cisco NX-OS Software is a suite of data center-level operating system software for switches. Execute any command on the operating system