VARIoT IoT vulnerabilities database
| VAR-202002-0700 | CVE-2020-3172 | Cisco FXOS and NX-OS Input verification vulnerabilities in software |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code as root or cause a denial of service (DoS) condition on an affected device. The vulnerability exists because of insufficiently validated Cisco Discovery Protocol packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2-adjacent affected device. A successful exploit could allow the attacker to cause a buffer overflow that could allow the attacker to execute arbitrary code as root or cause a DoS condition on the affected device. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Note: This vulnerability is different from the following Cisco FXOS and NX-OS Software Cisco Discovery Protocol vulnerabilities that Cisco announced on Feb. 5, 2020: Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability and Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability. Cisco FXOS and NX-OS The software contains an input verification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Cisco NX-OS Software and Cisco FXOS Software are both products of Cisco Corporation. Cisco NX-OS Software is a suite of data center-level operating system software for switches
| VAR-202002-0703 | CVE-2020-3175 | Cisco MDS 9000 For Cisco NX-OS Software exhaustion vulnerabilities |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A vulnerability in the resource handling system of Cisco NX-OS Software for Cisco MDS 9000 Series Multilayer Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource usage control. An attacker could exploit this vulnerability by sending traffic to the management interface (mgmt0) of an affected device at very high rates. An exploit could allow the attacker to cause unexpected behaviors such as high CPU usage, process crashes, or even full system reboots of an affected device. Cisco MDS 9000 For Cisco NX-OS Software contains a resource exhaustion vulnerability.Service operation interruption (DoS) It may be put into a state. Cisco MDS 9000 Series Multilayer Switches is an MDS 9000 series multilayer switch from Cisco (USA). Cisco NX-OS Software is a suite of data center-level operating system software for switches
| VAR-202002-1107 | CVE-2020-9274 | Pure-FTPd Vulnerability in accessing uninitialized pointers in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in Pure-FTPd 1.0.49. An uninitialized pointer vulnerability has been detected in the diraliases linked list. When the *lookup_alias(const char alias) or print_aliases(void) function is called, they fail to correctly detect the end of the linked list and try to access a non-existent list member. This is related to init_aliases in diraliases.c. Pure-FTPd is an FTP (File Transfer Protocol) server.
The 'init_aliases' function in the diraliases.c file in Pure-FTPd 1.0.49 has a security vulnerability. No detailed vulnerability details are provided at this time. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202003-54
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Low
Title: Pure-FTPd: Multiple vulnerabilities
Date: March 25, 2020
Bugs: #711124
ID: 202003-54
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Pure-FTPd, the worst of
which could allow remote attackers to cause a Denial of Service
condition.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-ftp/pure-ftpd < 1.0.49-r2 >= 1.0.49-r2
Description
===========
Multiple vulnerabilities have been discovered in Pure-FTPd. Please
review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly cause a Denial of Service condition or
cause an information disclosure.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Pure-FTPd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-ftp/pure-ftpd-1.0.49-r2"
References
==========
[ 1 ] CVE-2020-9274
https://nvd.nist.gov/vuln/detail/CVE-2020-9274
[ 2 ] CVE-2020-9365
https://nvd.nist.gov/vuln/detail/CVE-2020-9365
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202003-54
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us.
License
=======
Copyright 2020 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. ==========================================================================
Ubuntu Security Notice USN-4515-1
September 17, 2020
pure-ftpd vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Pure-FTPd could be made to expose sensitive information if it recieved
specially crafted input.
Software Description:
- pure-ftpd: Secure and efficient FTP server
Details:
Antonio Norales discovered that Pure-FTPd incorrectly handled directory
aliases. (CVE-2020-9274)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
pure-ftpd 1.0.36-3.2+deb8u1build0.16.04.1
pure-ftpd-common 1.0.36-3.2+deb8u1build0.16.04.1
pure-ftpd-ldap 1.0.36-3.2+deb8u1build0.16.04.1
pure-ftpd-mysql 1.0.36-3.2+deb8u1build0.16.04.1
pure-ftpd-postgresql 1.0.36-3.2+deb8u1build0.16.04.1
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4515-1
CVE-2020-9274
Package Information:
https://launchpad.net/ubuntu/+source/pure-ftpd/1.0.36-3.2+deb8u1build0.16.04.1
| VAR-202107-0409 | CVE-2020-5329 | DELL Dell EMC Avamar Server Input validation error vulnerability |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
Dell EMC Avamar Server contains an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. The vulnerability stems from the failure of the network system or product to properly validate the input data
| VAR-202002-1687 | No CVE | Feiyuxing enterprise-level intelligent wireless Internet behavior management system has a login bypass vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Chengdu Feiyuxing Technology Co., Ltd. serves enterprise, commercial and home users, providing intelligent and easy-to-use network communication management equipment and innovative technology value-added services.
The Feiyuxing enterprise-level intelligent wireless Internet behavior management system has a login bypass vulnerability. Attackers can use this vulnerability to directly log in to the background of the system and access any page in the background.
| VAR-202003-1597 | CVE-2020-6979 | Moxa EDS-G516E Vulnerability in using hard-coded credentials in series firmware |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa.
Moxa's EDS-G516E and EDS-510E series have hard-coded vulnerabilities that could be used by attackers to recover confidential data
| VAR-202003-1592 | CVE-2020-6967 | FactoryTalk Services Platform Unreliable data deserialization vulnerability in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
In Rockwell Automation all versions of FactoryTalk Diagnostics software, a subsystem of the FactoryTalk Services Platform, FactoryTalk Diagnostics exposes a .NET Remoting endpoint via RNADiagnosticsSrv.exe at TCPtcp/8082, which can insecurely deserialize untrusted data. FactoryTalk Services Platform Exists in an unreliable data deserialization vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Rockwell Automation is a provider of industrial automation, control and information technology solutions
| VAR-202003-0597 | CVE-2019-6558 | plural Auto-Maskin Product vulnerabilities related to weak password requirements |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In Auto-Maskin RP210E Versions 3.7 and prior, DCU210E Versions 3.7 and prior and Marine Observer Pro (Android App), the software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak. Auto-Maskin RP210E , DCU210E , Marine Observer Pro (Android App) There is a vulnerability in requesting a weak password.Information may be obtained. Auto-Maskin is a set of firmware that controls Norwegian marine diesel engines.
Auto-Maskin RP210E has a weak password vulnerability. Remote attackers can use this vulnerability to submit special requests for unauthorized access
| VAR-202003-1665 | CVE-2020-6993 | Moxa PT-7528 and PT-7828 Information leakage vulnerability in series firmware |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa. Attackers can use this vulnerability to obtain sensitive information
| VAR-202003-1674 | CVE-2020-7007 | Moxa EDS-G516E Out-of-bounds write vulnerabilities in series firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or target the device, causing it to go out of service. Moxa EDS-G516E A series firmware contains a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa
| VAR-202003-0528 | CVE-2019-9096 | plural Moxa MGate Vulnerability in requesting weak passwords on devices |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. Insufficient password requirements for the MGate web application may allow an attacker to gain access by brute-forcing account passwords. plural Moxa MGate The device is vulnerable to a weak password request.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa MB3170/MB3270/MB3180/MB3280/MB3480/MB3660 series is an advanced Ethernet gateway device produced by Taiwan Moxa Technology Co., Ltd.
Many Moxa products have weak password vulnerabilities. Attackers can use this vulnerability to gain access through brute force attacks
| VAR-202003-1608 | CVE-2020-6985 | Moxa PT-7528 and PT-7828 Vulnerability in using hard-coded credentials in series firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, these devices use a hard-coded service code for access to the console. (DoS) It may be put into a state. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa
| VAR-202003-1666 | CVE-2020-6995 | Moxa PT-7528 and PT-7828 Vulnerability in requesting weak passwords in series firmware |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the application utilizes weak password requirements, which may allow an attacker to gain unauthorized access. Moxa PT-7528 and PT-7828 The series firmware contains a vulnerability related to the request for a weak password.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa
| VAR-202003-0527 | CVE-2019-9095 | plural Moxa MGate Inadequate protection of credentials on devices |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An attacker may be able to intercept weakly encrypted passwords and gain administrative access. plural Moxa MGate Devices contain vulnerabilities in insufficient protection of credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa MB3170/MB3270/MB3180/MB3280/MB3480/MB3660 series is an advanced Ethernet gateway device produced by Taiwan Moxa Technology Co., Ltd.
Many Moxa products have weak encryption algorithm vulnerabilities that attackers can use to obtain sensitive information
| VAR-202003-1614 | CVE-2020-6991 | Moxa EDS-G516E Vulnerability in requesting weak passwords in series firmware |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force. Moxa EDS-G516E The series firmware contains a vulnerability related to the request for a weak password.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa.
Moxa's EDS-G516E and EDS-510E series have weak password vulnerabilities. Attackers can use this vulnerability to obtain sensitive information
| VAR-202003-0535 | CVE-2019-9104 | plural Moxa MGate Inadequate protection of credentials on devices |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. The application's configuration file contains parameters that represent passwords in cleartext. plural Moxa MGate Devices contain vulnerabilities in insufficient protection of credentials.Information may be obtained. Moxa MB3170/MB3270/MB3180/MB3280/MB3480/MB3660 series is an advanced Ethernet gateway device produced by Taiwan Moxa Technology Co., Ltd.
Many Moxa products have information disclosure vulnerabilities that attackers can use to access administrative accounts
| VAR-202003-1601 | CVE-2020-6983 | Moxa PT-7528 and PT-7828 Vulnerability in using hard-coded credentials in series firmware |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a hard-coded cryptographic key, which increases the possibility that confidential data can be recovered. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa
| VAR-202003-0531 | CVE-2019-9099 | plural Moxa MGate Classic buffer overflow vulnerability in device |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A Buffer overflow in the built-in web server allows remote attackers to initiate DoS, and probably to execute arbitrary code (issue 1 of 2). plural Moxa MGate A classic buffer overflow vulnerability exists on the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa MGate MB3170, etc. are all products of Moxa Company in Taiwan, China. Moxa MGate MB3170 is a MB3170 series Ethernet gateway product. Moxa MGate MB3270 is a MB3270 series Ethernet gateway product. Moxa MGate MB3280 is a MB3280 series Ethernet gateway product. An attacker can use this vulnerability to cause a denial of service or execute arbitrary code
| VAR-202003-1667 | CVE-2020-6997 | Moxa EDS-G516E Vulnerability in plaintext transmission of critical information in series firmware |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa. An attacker can use this vulnerability to obtain sensitive information
| VAR-202003-0598 | CVE-2019-6560 | plural Auto-Maskin Product password management vulnerabilities |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
In Auto-Maskin RP210E Versions 3.7 and prior, DCU210E Versions 3.7 and prior and Marine Observer Pro (Android App), the software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak. Auto-Maskin is a set of firmware that controls Norwegian marine diesel engines.
Auto-Maskin RP210E forgets that there is a security vulnerability in the password mechanism. A remote attacker can use this vulnerability to submit a special request to change the password of any user