VARIoT news about IoT security

Trust: 5.5

Fetched: Jan. 24, 2025, 9:09 a.m., Published: Jan. 23, 2025, 6:44 a.m.
Vulnerabilities: denial of service, buffer overflow
Affected productsExternal IDs
vendor: clamav model: clamav
vendor: cisco model: clamav
db: NVD ids: CVE-2025-20128

Trust: 4.75

Fetched: Jan. 24, 2025, 9:09 a.m., Published: Jan. 24, 2025, 2:49 a.m.
Vulnerabilities: information leak, path traversal, buffer overflow...
Affected productsExternal IDs
db: NVD ids: CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12084, CVE-2024-12085, CVE-2024-12747

Trust: 5.75

Fetched: Jan. 24, 2025, 9:09 a.m., Published: Jan. 20, 2025, 7:36 a.m.
Vulnerabilities: parameter injection, code execution, command injection
Affected productsExternal IDs
vendor: aruba model: arubaos
db: NVD ids: CVE-2025-23051, CVE-2025-23052

Trust: 3.25

Fetched: Jan. 24, 2025, 9:08 a.m., Published: Jan. 6, 2025, midnight
Vulnerabilities: configuration error
Affected productsExternal IDs

Trust: 6.0

Fetched: Jan. 24, 2025, 9:08 a.m., Published: Jan. 23, 2025, midnight
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: sonicwall model: secure mobile access
vendor: sonicwall model: sma100
vendor: sonicwall model: sma1000
db: NVD ids: CVE-2025-23006
Related entries in the VARIoT vulnerabilities database: VAR-201912-0830, VAR-201912-0828, VAR-202112-0361, VAR-202102-0898

Trust: 5.75

Fetched: Jan. 24, 2025, 9:08 a.m., Published: Jan. 23, 2025, 5:54 p.m.
Vulnerabilities: directory traversal, arbitrary command execution, sql injection...
Affected productsExternal IDs
vendor: sonicwall model: remote access
vendor: sonicwall model: sma 100
vendor: sonicwall model: secure mobile access
vendor: sonicwall model: sma100
db: NVD ids: CVE-2019-7483, CVE-2019-7481, CVE-2021-20038, CVE-2025-23006, CVE-2021-20016

Trust: 5.5

Fetched: Jan. 24, 2025, 9:07 a.m., Published: Jan. 23, 2025, midnight
Vulnerabilities: buffer overflow, code execution
Affected productsExternal IDs
vendor: palo model: networks
vendor: palo model: pan-os
vendor: palo model: firewall
vendor: palo alto networks model: networks
vendor: palo alto networks model: pan-os
vendor: palo alto networks model: firewall
db: NVD ids: CVE-2020-10713
Related entries in the VARIoT vulnerabilities database: VAR-202202-0147, VAR-202202-0009

Trust: 4.25

Fetched: Jan. 24, 2025, 9:07 a.m., Published: Jan. 23, 2025, 2 p.m.
Vulnerabilities: memory corruption, code execution, privilege escalation...
Affected productsExternal IDs
vendor: palo alto networks model: pan-os
vendor: palo alto networks model: networks
vendor: palo model: pan-os
vendor: palo model: networks
db: NVD ids: CVE-2021-43323, CVE-2021-42554, CVE-2021-33627, CVE-2020-10713, CVE-2021-42060, CVE-2024-0012, CVE-2021-45970, CVE-2024-9474, CVE-2022-24030

Trust: 5.0

Fetched: Jan. 24, 2025, 9:07 a.m., Published: Oct. 23, 2024, 3:57 p.m.
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: firepower threat defense
vendor: cisco model: adaptive security appliance
vendor: cisco model: series
vendor: cisco model: firepower threat defense software
vendor: cisco model: firepower
vendor: cisco model: series industrial security appliances
vendor: cisco model: asa software
Related entries in the VARIoT vulnerabilities database: VAR-202302-0598

Trust: 4.0

Fetched: Jan. 22, 2025, 9:28 a.m., Published: Dec. 30, 2024, 3:34 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: samsung model: mobile devices
vendor: samsung model: samsung
vendor: samsung model: mobile
vendor: samsung model: galaxy
db: NVD ids: CVE-2021-25337, CVE-2023-21433

Trust: 3.5

Fetched: Jan. 22, 2025, 9:27 a.m., Published: Jan. 7, 2025, 8:59 a.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: cisco model: meeting
vendor: cisco model: network access control
vendor: google model: home
vendor: node.js model: node.js

Trust: 3.25

Fetched: Jan. 22, 2025, 9:26 a.m., Published: Jan. 22, 9305, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: dell model: bios

Trust: 3.75

Fetched: Jan. 22, 2025, 9:24 a.m., Published: Jan. 21, 2025, 6:57 a.m.
Vulnerabilities: default credentials
Affected productsExternal IDs
vendor: wireshark model: wireshark

Trust: 3.75

Fetched: Jan. 22, 2025, 9:22 a.m., Published: Jan. 21, 2025, 6:39 a.m.
Vulnerabilities: privilege escalation, memory corruption, code execution
Affected productsExternal IDs
db: NVD ids: CVE-2025-24014

Trust: 4.5

Fetched: Jan. 22, 2025, 9:22 a.m., Published: Jan. 20, 2025, 11:47 a.m.
Vulnerabilities: default credentials, code execution
Affected productsExternal IDs
vendor: trend micro model: security
vendor: tp-link model: routers
vendor: trend model: security

Trust: 3.0

Fetched: Jan. 22, 2025, 9:21 a.m., Published: Jan. 21, 2025, 11:13 a.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2025-21210

Trust: 4.0

Fetched: Jan. 22, 2025, 9:21 a.m., Published: Jan. 21, 2025, 6:57 a.m.
Vulnerabilities: code execution
Affected productsExternal IDs
db: NVD ids: CVE-2024-11477, CVE-2025-0411

Trust: 4.0

Fetched: Jan. 22, 2025, 9:21 a.m., Published: Jan. 22, 7219, midnight
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: canonical model: ubuntu

Trust: 3.0

Fetched: Jan. 22, 2025, 9:20 a.m., Published: Dec. 27, 2024, 2:15 p.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2024-53237
Related entries in the VARIoT vulnerabilities database: VAR-202501-0795

Trust: 6.0

Fetched: Jan. 22, 2025, 9:19 a.m., Published: Jan. 21, 2025, 7:34 a.m.
Vulnerabilities: buffer overflow
Affected productsExternal IDs
vendor: tp-link model: routers
vendor: tp-link model: tl-wr940n
vendor: tp-link model: wr940n
db: NVD ids: CVE-2024-54887