VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201205-0208 CVE-2011-3295 Cisco IOS XR of NETIO and IPV4_IO Service disruption in the process (CPU Resource consumption ) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The NETIO and IPV4_IO processes in Cisco IOS XR 3.8 through 4.1, as used in Cisco Carrier Routing System and other products, allow remote attackers to cause a denial of service (CPU consumption) via crafted network traffic, aka Bug ID CSCti59888. Cisco IOS is a popular Internet operating system. An attacker can exploit this issue to cause excessive CPU consumption, resulting in a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCti59888
VAR-201205-0388 CVE-2011-3309 Cisco Adaptive Security Appliances 5500 series Vulnerabilities that capture important information on devices CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 through 8.4 process IKE requests despite a vpnclient mode configuration, which allows remote attackers to obtain potentially sensitive information by reading IKE responder traffic, aka Bug ID CSCtt07749. The problem is Bug ID CSCtt07749 It is a problem.By a third party IKE By reading the response traffic, important information may be obtained. Adaptive Security Appliance Software is prone to a information disclosure vulnerability. The vulnerability is caused by process IKE requests that allow the VPN client to modify the configuration
VAR-201205-0018 CVE-2011-4006 Cisco ASA 5500 Series device ESMTP Service interruption in inspection function (CPU Resource consumption ) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The ESMTP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 through 8.5 allows remote attackers to cause a denial of service (CPU consumption) via an unspecified closing sequence, aka Bug ID CSCtt32565. The problem is Bug ID CSCtt32565 It is a problem.Service disruption by a third party through an unspecified closing sequence (CPU Resource consumption ) There is a possibility of being put into a state
VAR-201205-0206 CVE-2011-3289 Cisco IOS In No Service Password-Recovery Vulnerability that bypasses functionality CVSS V2: 3.6
CVSS V3: -
Severity: LOW
Cisco IOS 12.4 and 15.0 through 15.2 allows physically proximate attackers to bypass the No Service Password-Recovery feature and read the start-up configuration via unspecified vectors, aka Bug ID CSCtr97640. Cisco IOS is a popular Internet operating system. Cisco IOS has a security-restricted vulnerability. Because the program does not control a physical direct attacker, a physical direct attacker can bypass the security restrictions and directly read the configuration file
VAR-201205-0205 CVE-2011-3285 Cisco Adaptive Security Appliances 5500 series In the device CRLF Injection vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
CRLF injection vulnerability in /+CSCOE+/logon.html on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 through 8.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors, aka Bug ID CSCth63101. The problem is Bug ID CSCth63101 It is a problem.By any third party HTTP Inserted header, or HTTP Response splitting attacks can be triggered
VAR-201205-0287 CVE-2012-0362 Cisco IOS Expansion ACL Vulnerabilities that prevent access restrictions on functions CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
The extended ACL functionality in Cisco IOS 12.2(58)SE2 and 15.0(1)SE discards all lines that end with a log or time keyword, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by sending network traffic, aka Bug ID CSCts01106. The problem is Bug ID CSCts01106 It is a problem.A third party may be able to circumvent access restrictions by sending network traffic using this situation. IOS is prone to a security bypass vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment. There is a vulnerability in the extended ACL function of Cisco IOS 12.2(58)SE2 release and 15.0(1)SE release
VAR-201205-0223 CVE-2012-0335 Cisco Adaptive Security Appliances 5500 Vulnerability in which important information is obtained in series devices CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 through 8.4 do not properly perform proxy authentication during attempts to cut through a firewall, which allows remote attackers to obtain sensitive information via a connection attempt, aka Bug ID CSCtx42746. The problem is Bug ID CSCtx42746 It is a problem.A third party may obtain important information through connection attempts. Cisco Adaptive Security Appliance is prone to an information-disclosure vulnerability. An attacker can exploit this issue to obtain potentially sensitive information. Information obtained may aid in further attacks. This issue is tracked by Cisco BugId CSCtw89522. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Cisco ASA Cut-Through Proxy Authentication Information Disclosure Vulnerability SECUNIA ADVISORY ID: SA49139 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49139/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49139 RELEASE DATE: 2012-05-16 DISCUSS ADVISORY: http://secunia.com/advisories/49139/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49139/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49139 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Cisco Adaptive Security Appliance (ASA), which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to an error within the cut-through proxy authentication and can be exploited to disclose certain information by tricking a user into authenticating. The vulnerability is reported in versions prior to interim release 8.4.3(8). SOLUTION: Update to interim release 8.4.3(8). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/web/software/280775065/89203/ASA-843-Interim-Release-Notes.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-201205-0020 CVE-2011-4012 Cisco IOS Fragmentation in ( Fragmentation ) Unknown vulnerabilities in the entry generation process CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
Cisco IOS 12.0, 15.0, and 15.1, when a Policy Feature Card 3C (PFC3C) is used, does not create a fragment entry during processing of an ICMPv6 ACL, which has unspecified impact and remote attack vectors, aka Bug ID CSCtj90091. The problem is Bug ID CSCtj90091 It is a problem.Details of the impact of this vulnerability are unknown. Cisco IOS is a popular Internet operating system. Policy Feature Card 3C (PFC3C) handles fragmentation errors in ICMPv6 ACLs, and remote attackers cause denial of service through elaborate network traffic. IOS is prone to a remote security vulnerability
VAR-201205-0216 CVE-2012-0333 Cisco Small Business IP Phone of SPA 500 Series firmware vulnerabilities to make phone calls CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco Small Business IP phones with SPA 500 series firmware 7.4.9 and earlier do not require authentication for Push XML requests, which allows remote attackers to make telephone calls via an XML document, aka Bug ID CSCts08768. The problem is Bug ID CSCts08768 It is a problem.By a third party XML You may be able to make a call through the document
VAR-201205-0023 CVE-2011-4016 Cisco IOS of PPP Service disruption in implementations ( Device crash ) Vulnerabilities CVSS V2: 5.4
CVSS V3: -
Severity: MEDIUM
The PPP implementation in Cisco IOS 12.2 and 15.0 through 15.2, when Point-to-Point Termination and Aggregation (PTA) and L2TP are used, allows remote attackers to cause a denial of service (device crash) via crafted network traffic, aka Bug ID CSCtf71673. IOS is prone to a denial-of-service vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment
VAR-201205-0225 CVE-2012-0338 Cisco IOS In any IP From address SSH Vulnerability that establishes a connection CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco IOS 12.2 through 12.4 and 15.0 does not recognize the vrf-also keyword during enforcement of access-class commands, which allows remote attackers to establish SSH connections from arbitrary source IP addresses via a standard SSH client, aka Bug ID CSCsv86113. IOS is prone to a remote security vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment
VAR-201205-0226 CVE-2012-0339 Cisco IOS In any IP From address TELNET Vulnerability that establishes a connection CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco IOS 12.2 through 12.4 and 15.0 does not recognize the vrf-also keyword during enforcement of access-class commands, which allows remote attackers to establish TELNET connections from arbitrary source IP addresses via a standard TELNET client, aka Bug ID CSCsi77774. IOS is prone to a remote security vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment
VAR-201205-0022 CVE-2011-4015 Cisco IOS Service disruption in ( Interface queue wedge ) Vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco IOS 15.2S allows remote attackers to cause a denial of service (interface queue wedge) via malformed UDP traffic on port 465, aka Bug ID CSCts48300. is prone to a denial-of-service vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment. Vulnerabilities exist in Cisco IOS Release 15.2S
VAR-201205-0204 CVE-2011-3283 Cisco Carrier Routing System Service disruption in ( Metro subsystem crash ) Vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco Carrier Routing System 3.9.1 allows remote attackers to cause a denial of service (Metro subsystem crash) via a fragmented GRE packet, aka Bug ID CSCts14887. The Cisco Carrier Routing System is a carrier-grade routing system. The system refuses service due to a special GRE packet fragmentation message. Successfully exploiting this issue allows remote attackers to crash the affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCts14887
VAR-201205-0011 CVE-2011-2583 Cisco Unified Contact Center Express Service disruption in (DoS) Vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco Unified Contact Center Express (aka CCX) 8.0 and 8.5 allows remote attackers to cause a denial of service via network traffic, as demonstrated by an SEC-BE-STABLE test case, aka Bug ID CSCth33834. The problem is Bug ID CSCth33834 It is a problem.Service disruption by a third party via network traffic (DoS) There is a possibility of being put into a state. A remote attacker could exploit this vulnerability to cause a denial of service through network traffic. This vulnerability has been confirmed by the SEC-BE-STABLE test case, also known as Bug ID CSCth33834
VAR-201205-0010 CVE-2011-2578 Cisco IOS Service disruption in ( Memory consumption ) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Memory leak in Cisco IOS 15.1 and 15.2 allows remote attackers to cause a denial of service (memory consumption) via malformed SIP packets on a NAT interface, aka Bug ID CSCts12366. IOS is prone to a denial-of-service vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment
VAR-201205-0012 CVE-2011-2586 Cisco IOS of HTTP Service disruption at the client ( Device crash ) Vulnerabilities CVSS V2: 5.4
CVSS V3: -
Severity: MEDIUM
The HTTP client in Cisco IOS 12.4 and 15.0 allows user-assisted remote attackers to cause a denial of service (device crash) via a malformed HTTP response to a request for service installation, aka Bug ID CSCts12249. IOS is prone to a denial-of-service vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment
VAR-201205-0286 CVE-2012-0361 Cisco IP Communicator of SCCP Service disruption in protocol components (DoS) Vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The sccp-protocol component in Cisco IP Communicator (CIPC) 7.0 through 8.6 does not limit the rate of SCCP messages to Cisco Unified Communications Manager (CUCM), which allows remote attackers to cause a denial of service via vectors that trigger (1) on hook and (2) off hook messages, as demonstrated by a Plantronics headset, aka Bug ID CSCti40315. The problem is Bug ID CSCti40315 It is a problem.By a third party (1) On hook and (2) Service operation disruption by triggering off-hook (DoS) There is a possibility of being put into a state. IP Communicator is prone to a denial-of-service vulnerability. A remote attacker can exploit this vulnerability to cause a denial of service by triggering (1) hook-on or (2) hook-off message vectors. This vulnerability has been confirmed by Plantronics headset, also known as Bug ID CSCti40315
VAR-201205-0207 CVE-2011-3293 Cisco Secure Access Control Server Vulnerable to cross-site request forgery CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Multiple cross-site request forgery (CSRF) vulnerabilities in the Solution Engine in Cisco Secure Access Control Server (ACS) 5.2 allow remote attackers to hijack the authentication of administrators for requests that insert cross-site scripting (XSS) sequences, aka Bug ID CSCtr78143. The problem is Bug ID CSCtr78143 It is a problem.Cross-site scripting by a third party (XSS) Inserting a sequence could hijack administrator authentication for the request. Exploiting these issues could allow an attacker to execute arbitrary code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database in the context of the server process. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Cisco Secure ACS Multiple Vulnerabilities SECUNIA ADVISORY ID: SA49101 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49101/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49101 RELEASE DATE: 2012-05-09 DISCUSS ADVISORY: http://secunia.com/advisories/49101/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49101/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49101 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Cisco Secure ACS, where some have unknown impacts and others can be exploited by malicious people to conduct script insertion, cross-site request forgery, and SQL injection attacks. 1) Some unspecified errors. No further information is currently available. 2) The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions by tricking a logged in user into visiting a malicious web site. 3) Certain unspecified input is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed. 4) Certain unspecified input is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. SOLUTION: Update to version 5.2.0.26 patch 9. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/web/software/282766937/37718/Acs-5-2-0-26-9-Readme.txt OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-201205-0387 CVE-2011-3317 Cisco Secure Access Control Server Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in the Solution Engine in Cisco Secure Access Control Server (ACS) 5.2 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCtr78192. The problem is Bug ID CSCtr78192 It is a problem.By any third party Web Script or HTML May be inserted. Exploiting these issues could allow an attacker to execute arbitrary code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database in the context of the server process. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Cisco Secure ACS Multiple Vulnerabilities SECUNIA ADVISORY ID: SA49101 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49101/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49101 RELEASE DATE: 2012-05-09 DISCUSS ADVISORY: http://secunia.com/advisories/49101/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49101/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49101 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Cisco Secure ACS, where some have unknown impacts and others can be exploited by malicious people to conduct script insertion, cross-site request forgery, and SQL injection attacks. 1) Some unspecified errors. No further information is currently available. 2) The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions by tricking a logged in user into visiting a malicious web site. 3) Certain unspecified input is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed. 4) Certain unspecified input is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. SOLUTION: Update to version 5.2.0.26 patch 9. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/web/software/282766937/37718/Acs-5-2-0-26-9-Readme.txt OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------