VARIoT news about IoT security

Trust: 4.75

Fetched: May 3, 2024, 9:42 a.m., Published: May 3, 2024, midnight
Vulnerabilities: command injection
Affected productsExternal IDs
vendor: palo model: networks
vendor: palo model: pan-os
vendor: palo alto networks model: networks
vendor: palo alto networks model: pan-os
db: NVD ids: CVE-2024-3400

Trust: 3.0

Fetched: May 3, 2024, 9:40 a.m., Published: May 7, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: firepower
vendor: cisco model: firepower threat defense software
vendor: cisco model: firepower threat defense
vendor: cisco model: adaptive security appliance

Trust: 3.25

Fetched: May 3, 2024, 9:38 a.m., Published: May 3, 2024, midnight
Vulnerabilities: default credentials, sql injection
Affected productsExternal IDs

Trust: 5.5

Fetched: May 3, 2024, 9:37 a.m., Published: April 17, 2024, 9:29 a.m.
Vulnerabilities: file creation vulnerability, command injection
Affected productsExternal IDs
vendor: palo model: networks
vendor: palo model: firewall
vendor: palo model: pan-os
vendor: palo alto networks model: networks
vendor: palo alto networks model: firewall
vendor: palo alto networks model: pan-os
db: NVD ids: CVE-2024-3400
Related entries in the VARIoT vulnerabilities database: VAR-202303-1268, VAR-201502-0201

Trust: 4.75

Fetched: May 3, 2024, 9:36 a.m., Published: May 1, 2024, 12:28 p.m.
Vulnerabilities: command injection
Affected productsExternal IDs
vendor: palo model: networks
vendor: palo model: pan-os
vendor: palo alto networks model: networks
vendor: palo alto networks model: pan-os
db: NVD ids: CVE-2023-1389, CVE-2015-2051, CVE-2024-3400
Related entries in the VARIoT vulnerabilities database: VAR-202404-0069, VAR-202404-0070

Trust: 5.75

Fetched: May 3, 2024, 9:36 a.m., Published: April 11, 2024, 9:48 p.m.
Vulnerabilities: code execution, command injection
Affected productsExternal IDs
vendor: d-link model: dns-325
vendor: d-link model: dns-340l
vendor: d-link model: dns-320l
vendor: d-link model: dns-327l
db: NVD ids: CVE-2024-3272, CVE-2024-3273
Related entries in the VARIoT vulnerabilities database: VAR-202404-0070

Trust: 4.0

Fetched: May 3, 2024, 9:34 a.m., Published: April 9, 2024, 6:57 a.m.
Vulnerabilities: code execution
Affected productsExternal IDs
db: NVD ids: CVE-2024-3273

Trust: 4.25

Fetched: May 3, 2024, 9:31 a.m., Published: April 29, 2024, 8:22 p.m.
Vulnerabilities: resource exhaustion, buffer overflow, service crash...
Affected productsExternal IDs
vendor: apple model: macos
vendor: apple model: mac os
vendor: snort model: snort
vendor: cisco model: ios xe software
vendor: cisco model: cisco ios
vendor: cisco model: asa software
vendor: cisco model: firepower threat defense
vendor: cisco model: wireless access point
vendor: cisco model: firepower management center
vendor: cisco model: adaptive security appliance
vendor: cisco model: cisco adaptive security appliance software
vendor: cisco model: firepower
vendor: cisco model: aironet
vendor: cisco model: cisco anyconnect secure mobility client
vendor: cisco model: adaptive security appliance software
vendor: cisco model: access points
vendor: cisco model: cisco firepower management center
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: sd-wan
vendor: cisco model: ios xe
vendor: cisco model: aironet access points
vendor: cisco model: anyconnect secure mobility client
vendor: cisco model: firepower threat defense software
vendor: cisco model: aironet access point
vendor: cisco model: cisco ios xe
vendor: aruba model: cx switches
vendor: aruba model: clearpass
vendor: aruba model: instantos
vendor: aruba model: clearpass policy manager
vendor: aruba model: arubaos
vendor: watchguard model: fireware
vendor: arubanetworks model: cx switches
vendor: arubanetworks model: clearpass
vendor: arubanetworks model: instantos
vendor: arubanetworks model: clearpass policy manager
vendor: arubanetworks model: arubaos
vendor: palo alto networks model: networks
vendor: palo alto networks model: pan-os
vendor: palo alto networks model: firewall
vendor: palo model: networks
vendor: palo model: pan-os
vendor: palo model: firewall
vendor: paloaltonetworks model: networks
vendor: paloaltonetworks model: pan-os
vendor: paloaltonetworks model: firewall
vendor: mitel model: mivoice connect
vendor: fortigate model: fortios
db: NVD ids: CVE-2023-20198, CVE-2022-37903, CVE-2022-20715, CVE-2022-20628, CVE-2002-20001, CVE-2022-37909, CVE-2022-37892, CVE-2022-23662, CVE-2022-37891, CVE-2022-23680, CVE-2022-37905, CVE-2022-37880, CVE-2022-37888, CVE-2022-20751, CVE-2022-23692, CVE-2022-37890, CVE-2022-23673, CVE-2021-34740, CVE-2021-37716, CVE-2019-5318, CVE-2021-37722, CVE-2021-37721, CVE-2021-37728, CVE-2022-37895, CVE-2022-37910, CVE-2022-20729, CVE-2022-22965, CVE-2024-22245, CVE-2022-37899, CVE-2022-37904, CVE-2022-23696, CVE-2022-23695, CVE-2022-23670, CVE-2022-23687, CVE-2024-22254, CVE-2022-23659, CVE-2022-32894, CVE-2022-37911, CVE-2022-20742, CVE-2021-37729, CVE-2022-3602, CVE-2022-32893, CVE-2021-1419, CVE-2022-23658, CVE-2022-43540, CVE-2022-23660, CVE-2022-23689, CVE-2022-37897, CVE-2022-23664, CVE-2022-43539, CVE-2022-23661, CVE-2023-0286, CVE-2022-20744, CVE-2022-43533, CVE-2022-20757, CVE-2020-15078, CVE-2022-20745, CVE-2022-23671, CVE-2022-43530, CVE-2021-37724, CVE-2022-37884, CVE-2022-43534, CVE-2024-20353, CVE-2021-37725, CVE-2022-23663, CVE-2022-43538, CVE-2022-43532, CVE-2021-1573, CVE-2022-37901, CVE-2022-20737, CVE-2022-23684, CVE-2021-4034, CVE-2022-20629, CVE-2022-23686, CVE-2021-44228, CVE-2022-23683, CVE-2021-34699, CVE-2022-23688, CVE-2022-23674, CVE-2021-22005, CVE-2022-37902, CVE-2022-37885, CVE-2022-41040, CVE-2023-35980, CVE-2022-37883, CVE-2022-37898, CVE-2022-4450, CVE-2022-23679, CVE-2022-23694, CVE-2021-34788, CVE-2022-42475, CVE-2022-43535, CVE-2022-0778, CVE-2022-20627, CVE-2024-23113, CVE-2022-29499, CVE-2022-23682, CVE-2024-22253, CVE-2022-23669, CVE-2022-37900, CVE-2022-37907, CVE-2022-20748, CVE-2022-20740, CVE-2022-43537, CVE-2022-23667, CVE-2021-37723, CVE-2022-37882, CVE-2024-21762, CVE-2022-43531, CVE-2022-37894, CVE-2022-23672, CVE-2024-20358, CVE-2020-3433, CVE-2022-20743, CVE-2022-41082, CVE-2022-23691, CVE-2022-25667, CVE-2022-23657, CVE-2022-37893, CVE-2022-23681, CVE-2022-2367, CVE-2022-37878, CVE-2021-37720, CVE-2022-20767, CVE-2022-23685, CVE-2022-23693, CVE-2022-37877, CVE-2022-3786, CVE-2022-23668, CVE-2022-37896, CVE-2024-21413, CVE-2023-35982, CVE-2024-22252, CVE-2021-40444, CVE-2024-20359, CVE-2022-37886, CVE-2022-20730, CVE-2024-22255, CVE-2021-40117, CVE-2023-35981, CVE-2024-3400, CVE-2021-21419, CVE-2022-20760, CVE-2021-34792, CVE-2022-23677, CVE-2022-40684, CVE-2023-0215, CVE-2021-37731, CVE-2022-43536, CVE-2022-37889, CVE-2022-20746, CVE-2021-37718, CVE-2024-21410, CVE-2022-37887, CVE-2021-42321, CVE-2023-25610, CVE-2021-37717, CVE-2022-20759, CVE-2022-23690, CVE-2022-37879, CVE-2022-37912, CVE-2022-23665, CVE-2020-37719, CVE-2021-33503, CVE-2022-37908, CVE-2022-23666, CVE-2022-23675, CVE-2022-37906, CVE-2024-22250, CVE-2021-37733, CVE-2022-37881, CVE-2023-21709

Trust: 4.5

Fetched: May 3, 2024, 9:30 a.m., Published: April 17, 2024, 2:27 p.m.
Vulnerabilities: improper validation, code execution
Affected productsExternal IDs
vendor: google model: android
db: NVD ids: CVE-2023-45866

Trust: 3.0

Fetched: May 3, 2024, 9:30 a.m., Published: Dec. 18, 2020, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: apple model: ipad

Trust: 4.5

Fetched: May 3, 2024, 9:27 a.m., Published: May 3, 2024, midnight
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: mikrotik model: routers
vendor: tp-link model: routers

Trust: 4.25

Fetched: May 3, 2024, 9:26 a.m., Published: May 9, 2024, midnight
Vulnerabilities: sql injection
Affected productsExternal IDs
db: NVD ids: CVE-2022-24627

Trust: 5.0

Fetched: May 3, 2024, 9:24 a.m., Published: April 24, 2024, 3:55 p.m.
Vulnerabilities: command injection
Affected productsExternal IDs
vendor: cisco model: firepower
vendor: cisco model: cisco firepower management center
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: asa software
vendor: cisco model: firepower threat defense
vendor: cisco model: firepower threat defense software
vendor: cisco model: firepower management center
vendor: cisco model: adaptive security appliance

Trust: 3.0

Fetched: May 3, 2024, 9:24 a.m., Published: May 2, 2024, midnight
Vulnerabilities: code execution
Affected productsExternal IDs

Trust: 3.0

Fetched: May 3, 2024, 9:23 a.m., Published: Jan. 18, 2024, midnight
Vulnerabilities: file execution
Affected productsExternal IDs

Trust: 3.0

Fetched: May 3, 2024, 9:23 a.m., Published: April 30, 2024, 7:51 a.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2024-26925

Trust: 4.0

Fetched: May 3, 2024, 9:21 a.m., Published: May 2, 2024, 4:26 a.m.
Vulnerabilities: privilege escalation, authentication bypass, sql injection
Affected productsExternal IDs
vendor: google model: chrome
vendor: google model: android
vendor: google model: home
Related entries in the VARIoT vulnerabilities database: VAR-202402-1245, VAR-202312-1066, VAR-202309-1995

Trust: 3.75

Fetched: May 3, 2024, 9:21 a.m., Published: -
Vulnerabilities: -
Affected productsExternal IDs
vendor: huawei model: huawei
db: NVD ids: CVE-2023-43552, CVE-2023-28560, CVE-2023-33069, CVE-2022-40524, CVE-2024-0045, CVE-2023-28567, CVE-2024-0049, CVE-2023-20907, CVE-2023-33080, CVE-2024-0048, CVE-2023-28565, CVE-2020-27066, CVE-2023-33089, CVE-2024-0050, CVE-2023-43550, CVE-2024-0051, CVE-2023-40122, CVE-2023-40081, CVE-2024-23717, CVE-2023-28558, CVE-2023-20908, CVE-2023-28539, CVE-2023-28583, CVE-2023-33105, CVE-2023-45866, CVE-2024-0039, CVE-2023-28544, CVE-2023-33038, CVE-2023-33090, CVE-2024-0037, CVE-2024-0033, CVE-2024-0053
Related entries in the VARIoT vulnerabilities database: VAR-202404-0069, VAR-202404-0070

Trust: 5.5

Fetched: May 3, 2024, 9:19 a.m., Published: April 9, 2024, 10:16 a.m.
Vulnerabilities: command injection, command execution
Affected productsExternal IDs
vendor: d-link model: dns-325
vendor: d-link model: dns-320l
vendor: d-link model: dns-340l
vendor: d-link model: dns-327l
vendor: google model: android
db: NVD ids: CVE-2024-3272, CVE-2024-3273

Trust: 3.0

Fetched: May 3, 2024, 9:19 a.m., Published: March 4, 2022, midnight
Vulnerabilities: configuration attack
Affected productsExternal IDs