Page 8 of 95 results (0.003 seconds)

CVSS: 7.8EPSS: 11%CPEs: 24EXPL: 3

25 Sep 2019 — Ubiquiti EdgeMAX devices before 2.0.3 allow remote attackers to cause a denial of service (disk consumption) because *.cache files in /var/run/beaker/container_file/ are created when providing a valid length payload of 249 characters or fewer to the beaker.session.id cookie in a GET header. The attacker can use a long series of unique session IDs. Los dispositivos Ubiquiti EdgeMAX versiones anteriores a 2.0.3, permiten a atacantes remotos causar una denegación de servicio (consumo de disco) porque los archi... • https://github.com/grampae/CVE-2019-16889-poc • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

30 Jul 2019 — SMTP MITM refers to a malicious actor setting up an SMTP proxy server between the UniFi Controller version <= 5.10.21 and their actual SMTP server to record their SMTP credentials for malicious use later. Un MITM de SMTP se refiere a un actor malicioso que configura un servidor proxy SMTP entre la versión anterior a 5.10.21 (incluida) del controlador UniFi y su servidor SMTP actual, para registrar sus credenciales SMTP para un uso malicioso posterior. • https://community.ui.com/releases/862b962b-55f6-4324-96be-610f647d5c1c • CWE-255: Credentials Management Errors CWE-300: Channel Accessible by Non-Endpoint •

CVSS: 9.0EPSS: 0%CPEs: 12EXPL: 0

10 Jul 2019 — Command Injection in EdgeMAX EdgeSwitch prior to 1.8.2 allow an Admin user to execute commands as root. Una Inyección de Comandos en EdgeMAX EdgeSwitch versiones anteriores a 1.8.2, permite a un usuario administrador ejecutar comandos como root. • https://community.ui.com/releases/EdgeMAX-EdgeSwitch-Firmware-v1-8-2/824d58b1-6027-49cf-878d-2076c01948b7 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 4.9EPSS: 0%CPEs: 12EXPL: 0

10 Jul 2019 — DoS in EdgeMAX EdgeSwitch prior to 1.8.2 allow an Admin user to Crash the SSH CLI interface by using crafted commands. Una DoS en EdgeMAX EdgeSwitch versiones anteriores a 1.8.2, permite que un usuario administrador Bloquee la interfaz de la CLI de SSH mediante el uso de comandos especialmente diseñados. • https://community.ui.com/releases/EdgeMAX-EdgeSwitch-Firmware-v1-8-2/824d58b1-6027-49cf-878d-2076c01948b7 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.8EPSS: 55%CPEs: 3EXPL: 0

11 Jun 2019 — On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4.0.1 for 802.11 ISP products, v5.3.5 for AirMax ISP products, and v5.4.5 for AirSync firmware. For example, Nanostation5 (Air OS) is affected. En ciertos dispositivos Ubiquiti, la Inyección de comandos existe a través de una solicitud GET para stainfo.cgi ( conocida como Mostrar información de A... • https://community.ubnt.com/t5/airMAX-General-Discussion/AirOS-Security-Exploit-Updated-Firmware/td-p/212974 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 5.9EPSS: 0%CPEs: 2EXPL: 1

07 Jun 2019 — Ubiquiti UniFi 52 devices, when Hotspot mode is used, allow remote attackers to bypass intended restrictions on "free time" Wi-Fi usage by sending a /guest/s/default/ request to obtain a cookie, and then using this cookie in a /guest/s/default/login request with the byfree parameter. En los dispositivos Ubiquiti UniFi versión 52, cuando el modo HotSpot es usado, permite a atacantes remotos omitir las restricciones previstas en el uso de Wi-Fi "free time" mediante el envío de una petición /Guest/s/default/ p... • https://www.red4sec.com/cve/unifi.txt • CWE-284: Improper Access Control •

CVSS: 7.2EPSS: 2%CPEs: 2EXPL: 1

07 Jun 2019 — Ubiquiti EdgeOS 1.9.1 on EdgeRouter Lite devices allows remote attackers to execute arbitrary code with admin credentials, because /opt/vyatta/share/vyatta-cfg/templates/system/static-host-mapping/host-name/node.def does not sanitize the 'alias' or 'ips' parameter for shell metacharacters. Ubiquiti EdgeOS versión 1.9.1 en dispositivos EdgeRouter Lite, permite a atacantes remotos ejecutar código arbitrario con credenciales de administrador, porque /opt/vyatta/share/vyatta-cfg/templates/System/static-host-map... • https://www.red4sec.com/cve/edgerouter_lite.txt • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

04 Jun 2019 — On Ubiquiti airCam 3.1.4 devices, a Denial of Service vulnerability exists in the RTSP Service provided by the ubnt-streamer binary. The issue can be triggered via malformed RTSP requests that lead to an invalid memory read. To exploit the vulnerability, an attacker must craft an RTSP request with a large number of headers. En los dispositivos Ubiquiti airCam 3.1.4, existe una vulnerabilidad de denegación de servicio en el servicio RTSP provisto por el binario ubnt-streamer. El problema se puede desencadena... • https://github.com/X-C3LL/PoC-CVEs/blob/master/Aircam-DoS/Aircam-DoS.py • CWE-125: Out-of-bounds Read •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

06 May 2019 — In UniFi Video 3.10.0 and prior, due to the lack of CSRF protection, it is possible to abuse the Web API to make changes on the server configuration without the user consent, requiring the attacker to lure an authenticated user to access on attacker controlled page. En UniFi Video versión 3.10.0 y las anteriores, debido a la falta de protección CSRF, es posible abusar de la API Web para realizar cambios en la configuración del servidor sin el consentimiento del usuario, requiere que el atacante atraiga a un... • https://community.ubnt.com/t5/UniFi-Video-Blog/UniFi-Video-3-10-1-Soft-Release/ba-p/2658279 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

10 Apr 2019 — In Ubiquiti Networks EdgeSwitch X v1.1.0 and prior, an unauthenticated user can use the "local port forwarding" and "dynamic port forwarding" (SOCKS proxy) functionalities. Remote attackers without credentials can exploit this bug to access local services or forward traffic through the device if SSH is enabled in the system settings. En Ubiquiti Networks EdgeSwitch X 1.1.0 y versiones anteriores, un usuario no autenticado puede utilizar las funcionalidades "local port forwarding" y "dynamic port forwarding"... • https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeSwitch-X-software-release-v1-1-1/ba-p/2731137 • CWE-287: Improper Authentication •