1. Vulnerabilities of foreign manufacturers’ products
1. Fortinet FortiSIEM Windows Agent Command Execution Vulnerability
Fortinet FortiSIEM Windows Agent is an agent from Fortinet that collects logs and other behaviors from Windows servers. Fortinet FortiSIEM Windows Agent 4.1.4 and below has a security vulnerability, which can be exploited by an attacker to execute privileged code or commands through powershell script.
2. WordPress Access Control Error Vulnerability
WordPress is a blog platform developed by the WordPress (WordPress) Foundation using the PHP language. The platform supports setting up personal blog sites on PHP and MySQL servers. An access control error vulnerability exists in WordPress Plugin Hashthemes Demo Importer 1.1.1 and earlier. The vulnerability stems from the fact that the affected product contains several AJAX functions that rely on random numbers visible to all logged in users for access control. Attackers can exploit this vulnerability. Execute a function that truncates almost all database tables and deletes content wp content/uploads.
3. GPAC buffer overflow vulnerability (CNVD-2021-84263)
GPAC is an open source multimedia framework. GPAC has a buffer error vulnerability that stems from an issue found in gpac 0.8.0. The gf_media_nalu_remove_emulation_bytes function in av_parsers.c has a heap-based buffer overflow that could be exploited by an attacker to cause a Denial of Service (DOS) with crafted input.
4. Fortinet FortiAnalyzer Cross-Site Scripting Vulnerability (CNVD-2021-84244)
FortinetFortiAnalyzer is a centralized cybersecurity reporting solution from Fortinet. This product is mainly used to collect network log data, and analyze, report, and archive the security events, network traffic, and web content in the log through the reporting suite. A cross-site scripting vulnerability exists in Fortinet FortiAnalyzer, which stems from the product’s pages failing to properly handle user input data. An attacker could use this vulnerability to execute client-side code.
5. HP LaserJet Pro printer has unauthorized access vulnerability
The Hp LaserJet Pro Printer is a laser printer from the Hewlett-Packard (Hp) company in the United States. A security vulnerability exists in the HP LaserJet Pro printer that could allow an attacker to reconfigure or reset the device by an unauthorized user.
2. Vulnerabilities of domestic manufacturers’ products
1. Xiaomi Mi WiFi has arbitrary file reading vulnerability
Xiaomi Technology Co., Ltd. was established on March 3, 2010. It is a global mobile Internet enterprise focusing on the research and development of intelligent hardware and Electronic products. It is also an innovative company focusing on the construction of high-end smartphones, Internet TVs and smart home ecological chains. type technology company. Arbitrary file read vulnerability exists in Xiaomi Mi WiFi An arbitrary file read vulnerability exists, which can be exploited by attackers to obtain sensitive information.
2. There is a weak password vulnerability in the web application security protection system (CNVD-2021-71692)
Beijing Wangyu Xingyun Information Technology Co., Ltd., whose business covers network border security protection, application and data security protection, network-wide security risk management, professional security solutions and professional security services, etc. There is a weak password vulnerability in the web application security protection system of Wangyu, which can be exploited by attackers to obtain sensitive information.
3. Huawei Emui and Magic UI Incorrect Validation Vulnerability (CNVD-2021-83531)
Huawei Emui is a mobile operating system based on Android. Magic Ui is a mobile operating system based on Android. There are security vulnerabilities in Huawei Emui and Magic UI, which can be exploited by attackers to cause the transmission of certain virtual information.
4. Tenda AC-10U buffer overflow vulnerability
The Tenda AC-10U is a wireless router from the Chinese company Tenda. A buffer overflow vulnerability exists in the Tenda AC-10U AC1200 router, which exists due to a boundary error when handling untrusted input. A remote attacker can execute arbitrary code through the timeZone parameter of goform/SetSysTimeCfg.
5. Huawei Emui and Magic UI Race Condition Vulnerability
The Huawei Smartphone is a smartphone from the Chinese company Huawei. There are security vulnerabilities in Huawei Emui and Magic UI, which can be exploited by attackers to cause exceptions when managing the trust list of the system.
Note: Concern analysis is comprehensively assessed by the CNVD Secretariat based on Internet users’ access to CNVD vulnerability information and the extensive application of products.