VARIoT news about IoT security

Related entries in the VARIoT vulnerabilities database: VAR-202201-1068, VAR-202201-1063, VAR-202201-1730

Trust: 5.5

Fetched: Aug. 9, 2023, 9:24 a.m., Published: -
Vulnerabilities: privilege escalation, format string vulnerability, buffer overflow...
Affected productsExternal IDs
vendor: huawei model: huawei
db: NVD ids: CVE-2023-34164, CVE-2021-40032, CVE-2023-37240, CVE-2022-48516, CVE-2022-48520, CVE-2022-48512, CVE-2022-48513, CVE-2022-48514, CVE-2023-1695, CVE-2021-46894, CVE-2022-48511, CVE-2021-40027, CVE-2023-37238, CVE-2021-46892, CVE-2022-48518, CVE-2022-48507, CVE-2022-48515, CVE-2021-46893, CVE-2022-48517, CVE-2022-48509, CVE-2023-1691, CVE-2023-37239, CVE-2023-37245, CVE-2021-46890, CVE-2022-48510, CVE-2021-40014, CVE-2022-48519, CVE-2023-3455, CVE-2023-37241, CVE-2021-46891, CVE-2023-3456, CVE-2022-48508, CVE-2023-37242

Trust: 5.25

Fetched: Aug. 9, 2023, 9:22 a.m., Published: Aug. 9, 2022, midnight
Vulnerabilities: privilege escalation, security feature bypass, sql injection...
Affected productsExternal IDs
vendor: zoho model: manageengine adselfservice plus
vendor: citrix model: sd-wan
vendor: citrix model: netscaler adc
vendor: citrix model: application delivery controller
vendor: citrix model: netscaler gateway
vendor: citrix model: sd-wan wanop
vendor: citrix model: netscaler
vendor: citrix model: gateway
vendor: sonicwall model: ssl-vpn
vendor: sonicwall model: email security
vendor: sonicwall model: sma 100
vendor: sonicwall model: sma100
vendor: sonicwall model: analyzer
vendor: sonicwall model: ssl vpn
vendor: pulse secure model: policy secure
vendor: pulse secure model: connect secure
vendor: pulse secure model: pulse connect secure
vendor: pulse secure model: pulse policy secure
vendor: pulse model: secure pulse connect secure
vendor: wso2 model: application server
vendor: wso2 model: enterprise integrator
vendor: wso2 model: identity server
vendor: wso2 model: wso2 enterprise integrator
vendor: wso2 model: wso2 identity server
vendor: wso2 model: api manager
vendor: wso2 model: identity server analytics
vendor: wso2 model: wso2 api manager
vendor: qnap model: photo station
db: NVD ids: CVE-2022-22954, CVE-2022-1388, CVE-2021-26855, CVE-2022-42475, CVE-2021-34523, CVE-2021-20038, CVE-2021-26084, CVE-2022-22960, CVE-2021-20016, CVE-2021-26858, CVE-2019-11510, CVE-2019-0708, CVE-2021-42013, CVE-2020-1472, CVE-2022-40684, CVE-2022-26134, CVE-2019-19781, CVE-2021-27065, CVE-2018-13379, CVE-2021-26857, CVE-2020-14883, CVE-2021-41773, CVE-2022-29464, CVE-2022-27924, CVE-2021-45046, CVE-2022-27593, CVE-2017-11882, CVE-2021-40539, CVE-2022-22963, CVE-2022-24682, CVE-2022-41082, CVE-2017-0199, CVE-2022-22047, CVE-2021-40438, CVE-2021-31207, CVE-2021-34473, CVE-2022-22536, CVE-2022-30190, CVE-2020-14882, CVE-2020-5902, CVE-2021-20021

Trust: 3.25

Fetched: Aug. 9, 2023, 9:22 a.m., Published: -
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-35078, CVE-2023-35081
Related entries in the VARIoT vulnerabilities database: VAR-202112-0949, VAR-202307-0110, VAR-202303-2113

Trust: 4.5

Fetched: Aug. 9, 2023, 9:21 a.m., Published: Aug. 4, 2023, 5:15 p.m.
Vulnerabilities: information leakage, input verification vulnerability, privilege escalation
Affected productsExternal IDs
vendor: huawei model: emui
vendor: huawei model: huawei
db: NVD ids: CVE-2023-21180, CVE-2023-39403, CVE-2023-39389, CVE-2021-40006, CVE-2023-39381, CVE-2023-39405, CVE-2023-21185, CVE-2023-39402, CVE-2023-20985, CVE-2023-39398, CVE-2023-20981, CVE-2023-21202, CVE-2023-22386, CVE-2023-21196, CVE-2023-39390, CVE-2023-21167, CVE-2023-21175, CVE-2023-20986, CVE-2023-39395, CVE-2023-28541, CVE-2023-21193, CVE-2022-42703, CVE-2023-21145, CVE-2023-21199, CVE-2023-39393, CVE-2023-21201, CVE-2023-21246, CVE-2023-39385, CVE-2023-20977, CVE-2023-39401, CVE-2023-39397, CVE-2022-20199, CVE-2023-21172, CVE-2023-21238, CVE-2023-21250, CVE-2023-20987, CVE-2021-46895, CVE-2023-39394, CVE-2023-20980, CVE-2021-0948, CVE-2023-39392, CVE-2023-28542, CVE-2023-21241, CVE-2023-39383, CVE-2023-39399, CVE-2023-20979, CVE-2023-21173, CVE-2023-20983, CVE-2023-20982, CVE-2023-20973, CVE-2023-39386, CVE-2023-20989, CVE-2023-39400, CVE-2023-21168, CVE-2023-39396, CVE-2022-27405, CVE-2023-20988, CVE-2023-39406, CVE-2023-39382, CVE-2023-39388, CVE-2023-39404, CVE-2023-39380, CVE-2023-20990, CVE-2022-27406, CVE-2023-39387, CVE-2023-20918, CVE-2023-39391, CVE-2023-39384, CVE-2023-20974
Related entries in the VARIoT vulnerabilities database: VAR-202112-0949, VAR-202307-0110, VAR-202303-2113

Trust: 4.5

Fetched: Aug. 9, 2023, 9:21 a.m., Published: Aug. 4, 2023, 4:37 p.m.
Vulnerabilities: information leakage, input verification vulnerability, privilege escalation
Affected productsExternal IDs
vendor: huawei model: emui
vendor: huawei model: huawei
db: NVD ids: CVE-2023-21180, CVE-2023-39403, CVE-2023-39389, CVE-2021-40006, CVE-2023-39381, CVE-2023-39405, CVE-2023-21185, CVE-2023-39402, CVE-2023-20985, CVE-2023-39398, CVE-2023-20981, CVE-2023-21202, CVE-2023-22386, CVE-2023-21196, CVE-2023-39390, CVE-2023-21167, CVE-2023-21175, CVE-2023-20986, CVE-2023-39395, CVE-2023-28541, CVE-2023-21193, CVE-2022-42703, CVE-2023-21145, CVE-2023-21199, CVE-2023-39393, CVE-2023-21201, CVE-2023-21246, CVE-2023-39385, CVE-2023-20977, CVE-2023-39401, CVE-2023-39397, CVE-2022-20199, CVE-2023-21172, CVE-2023-21238, CVE-2023-21250, CVE-2023-20987, CVE-2021-46895, CVE-2023-39394, CVE-2023-20980, CVE-2021-0948, CVE-2023-39392, CVE-2023-28542, CVE-2023-21241, CVE-2023-39383, CVE-2023-39399, CVE-2023-20979, CVE-2023-21173, CVE-2023-20983, CVE-2023-20982, CVE-2023-20973, CVE-2023-39386, CVE-2023-20989, CVE-2023-39400, CVE-2023-21168, CVE-2023-39396, CVE-2022-27405, CVE-2023-20988, CVE-2023-39406, CVE-2023-39382, CVE-2023-39388, CVE-2023-39404, CVE-2023-39380, CVE-2023-20990, CVE-2022-27406, CVE-2023-39387, CVE-2023-20918, CVE-2023-39391, CVE-2023-39384, CVE-2023-20974
Related entries in the VARIoT vulnerabilities database: VAR-202112-0949, VAR-202307-0110, VAR-202303-2113

Trust: 4.5

Fetched: Aug. 9, 2023, 9:20 a.m., Published: Aug. 4, 2023, 4:08 p.m.
Vulnerabilities: information leakage, input verification vulnerability, privilege escalation
Affected productsExternal IDs
vendor: huawei model: emui
vendor: huawei model: huawei
db: NVD ids: CVE-2023-21180, CVE-2023-39403, CVE-2023-39389, CVE-2021-40006, CVE-2023-39381, CVE-2023-39405, CVE-2023-21185, CVE-2023-39402, CVE-2023-20985, CVE-2023-39398, CVE-2023-20981, CVE-2023-21202, CVE-2023-22386, CVE-2023-21196, CVE-2023-39390, CVE-2023-21167, CVE-2023-21175, CVE-2023-20986, CVE-2023-39395, CVE-2023-28541, CVE-2023-21193, CVE-2022-42703, CVE-2023-21145, CVE-2023-21199, CVE-2023-39393, CVE-2023-21201, CVE-2023-21246, CVE-2023-39385, CVE-2023-20977, CVE-2023-39401, CVE-2023-39397, CVE-2022-20199, CVE-2023-21172, CVE-2023-21238, CVE-2023-21250, CVE-2023-20987, CVE-2021-46895, CVE-2023-39394, CVE-2023-20980, CVE-2021-0948, CVE-2023-39392, CVE-2023-28542, CVE-2023-21241, CVE-2023-39383, CVE-2023-39399, CVE-2023-20979, CVE-2023-21173, CVE-2023-20983, CVE-2023-20982, CVE-2023-20973, CVE-2023-39386, CVE-2023-20989, CVE-2023-39400, CVE-2023-21168, CVE-2023-39396, CVE-2022-27405, CVE-2023-20988, CVE-2023-39406, CVE-2023-39382, CVE-2023-39388, CVE-2023-39404, CVE-2023-39380, CVE-2023-20990, CVE-2022-27406, CVE-2023-39387, CVE-2023-20918, CVE-2023-39391, CVE-2023-39384, CVE-2023-20974
Related entries in the VARIoT vulnerabilities database: VAR-202112-0949, VAR-202307-0110, VAR-202303-2113

Trust: 4.5

Fetched: Aug. 9, 2023, 9:20 a.m., Published: Aug. 4, 2023, 4:39 p.m.
Vulnerabilities: information leakage, input verification vulnerability, privilege escalation
Affected productsExternal IDs
vendor: huawei model: emui
vendor: huawei model: huawei
db: NVD ids: CVE-2023-21180, CVE-2023-39403, CVE-2023-39389, CVE-2021-40006, CVE-2023-39381, CVE-2023-39405, CVE-2023-21185, CVE-2023-39402, CVE-2023-20985, CVE-2023-39398, CVE-2023-20981, CVE-2023-21202, CVE-2023-22386, CVE-2023-21196, CVE-2023-39390, CVE-2023-21167, CVE-2023-21175, CVE-2023-20986, CVE-2023-39395, CVE-2023-28541, CVE-2023-21193, CVE-2022-42703, CVE-2023-21145, CVE-2023-21199, CVE-2023-39393, CVE-2023-21201, CVE-2023-21246, CVE-2023-39385, CVE-2023-20977, CVE-2023-39401, CVE-2023-39397, CVE-2022-20199, CVE-2023-21172, CVE-2023-21238, CVE-2023-21250, CVE-2023-20987, CVE-2021-46895, CVE-2023-39394, CVE-2023-20980, CVE-2021-0948, CVE-2023-39392, CVE-2023-28542, CVE-2023-21241, CVE-2023-39383, CVE-2023-39399, CVE-2023-20979, CVE-2023-21173, CVE-2023-20983, CVE-2023-20982, CVE-2023-20973, CVE-2023-39386, CVE-2023-20989, CVE-2023-39400, CVE-2023-21168, CVE-2023-39396, CVE-2022-27405, CVE-2023-20988, CVE-2023-39406, CVE-2023-39382, CVE-2023-39388, CVE-2023-39404, CVE-2023-39380, CVE-2023-20990, CVE-2022-27406, CVE-2023-39387, CVE-2023-20918, CVE-2023-39391, CVE-2023-39384, CVE-2023-20974

Trust: 3.75

Fetched: Aug. 9, 2023, 9:19 a.m., Published: July 11, 2023, midnight
Vulnerabilities: code execution
Affected productsExternal IDs
db: NVD ids: CVE-2023-36664

Trust: 5.25

Fetched: Aug. 9, 2023, 9:19 a.m., Published: July 11, 2023, 4:43 p.m.
Vulnerabilities: cross-site scripting
Affected productsExternal IDs

Trust: 4.25

Fetched: Aug. 9, 2023, 9:18 a.m., Published: June 13, 2023, midnight
Vulnerabilities: information disclosure
Affected productsExternal IDs
db: NVD ids: CVE-2023-32019

Trust: 4.5

Fetched: Aug. 8, 2023, 9:34 a.m., Published: June 19, 2023, 2:37 p.m.
Vulnerabilities: sql injection
Affected productsExternal IDs
vendor: ipswitch model: moveit transfer
vendor: check point model: check point
db: NVD ids: CVE-2023-34362

Trust: 6.0

Fetched: Aug. 8, 2023, 9:34 a.m., Published: May 9, 2023, 7:47 p.m.
Vulnerabilities: code execution, improper access control, authentication bypass
Affected productsExternal IDs
vendor: barracuda model: barracuda
db: NVD ids: CVE-2023-27350

Trust: 4.0

Fetched: Aug. 8, 2023, 9:33 a.m., Published: Aug. 1, 2023, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: android
db: NVD ids: CVE-2023-28369
Related entries in the VARIoT vulnerabilities database: VAR-202305-2074

Trust: 3.75

Fetched: Aug. 8, 2023, 9:32 a.m., Published: June 21, 2023, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: motorola model: motorola
db: NVD ids: CVE-2022-46680
Related entries in the VARIoT vulnerabilities database: VAR-202112-0566

Trust: 3.0

Fetched: Aug. 8, 2023, 9:31 a.m., Published: June 22, 2022, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2021-44228
Related entries in the VARIoT vulnerabilities database: VAR-202305-2285, VAR-202304-2073, VAR-202305-2121

Trust: 5.75

Fetched: Aug. 8, 2023, 9:30 a.m., Published: June 20, 2023, 2:08 p.m.
Vulnerabilities: code execution, command injection, buffer overflow
Affected productsExternal IDs
vendor: zyxel model: nas540
vendor: zyxel model: nas542
vendor: zyxel model: nas326
db: NVD ids: CVE-2023-33010, CVE-2023-27992, CVE-2023-28771, CVE-2023-33009

Trust: 5.75

Fetched: Aug. 8, 2023, 9:24 a.m., Published: Aug. 8, 2023, midnight
Vulnerabilities: code execution, information disclosure, denial of service
Affected productsExternal IDs
vendor: google model: android
db: NVD ids: CVE-2023-21234, CVE-2023-21229, CVE-2023-21233, CVE-2023-21235, CVE-2023-35689, CVE-2023-21231, CVE-2023-21232, CVE-2023-21230

Trust: 5.0

Fetched: Aug. 8, 2023, 9:24 a.m., Published: -
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: cisco model: cisco sd-wan vedge
vendor: cisco model: sd-wan vedge
vendor: cisco model: sd-wan vedge routers
vendor: cisco model: vedge
vendor: cisco model: routers
vendor: cisco model: sd-wan
vendor: cisco model: cisco sd-wan

Trust: 3.0

Fetched: Aug. 8, 2023, 9:18 a.m., Published: July 28, 2023, midnight
Vulnerabilities: authentication bypass
Affected productsExternal IDs
db: NVD ids: CVE-2023-35078, CVE-2023-35081

Trust: 3.0

Fetched: Aug. 8, 2023, 9:18 a.m., Published: Aug. 7, 2023, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-35082