VARIoT IoT vulnerabilities database
| VAR-202002-0717 | CVE-2020-3154 | Cisco Cloud Web Security In SQL Injection vulnerabilities |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
A vulnerability in the web UI of Cisco Cloud Web Security (CWS) could allow an authenticated, remote attacker to execute arbitrary SQL queries. The vulnerability exists because the web-based management interface improperly validates SQL values. An authenticated attacker could exploit this vulnerability sending malicious requests to the affected device. An exploit could allow the attacker to modify values on or return values from the underlying database
| VAR-202003-0525 | CVE-2019-6696 | FortiOS Open redirect vulnerability in |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
An improper input validation vulnerability in FortiOS 6.2.1, 6.2.0, 6.0.8 and below until 5.4.0 under admin webUI may allow an attacker to perform an URL redirect attack via a specifically crafted request to the admin initial password change webpage. FortiOS Exists in an open redirect vulnerability.Information may be obtained and tampered with. Fortinet FortiOS is a set of security operating system dedicated to the FortiGate network security platform developed by Fortinet. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSLVPN, Web content filtering and anti-spam. A security vulnerability exists in Fortinet FortiOS. An attacker could exploit this vulnerability to redirect users to malicious websites. The following products and versions are affected: FortiOS 6.2.1, 6.2.0, 5.4.0 to 6.0.8
| VAR-202002-0719 | CVE-2020-3158 | Cisco Smart Software Manager On-Prem Vulnerability in using hard-coded credentials in |
CVSS V2: 8.8 CVSS V3: 9.1 Severity: CRITICAL |
A vulnerability in the High Availability (HA) service of Cisco Smart Software Manager On-Prem could allow an unauthenticated, remote attacker to access a sensitive part of the system with a high-privileged account. The vulnerability is due to a system account that has a default and static password and is not under the control of the system administrator. An attacker could exploit this vulnerability by using this default account to connect to the affected system. A successful exploit could allow the attacker to obtain read and write access to system data, including the configuration of an affected device. The attacker would gain access to a sensitive portion of the system, but the attacker would not have full administrative rights to control the device
| VAR-202002-0706 | CVE-2020-3138 | Cisco Enterprise NFV Infrastructure Software Digital Signature Verification Vulnerability in |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in the upgrade component of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to install a malicious file when upgrading. The vulnerability is due to insufficient signature validation. An attacker could exploit this vulnerability by providing a crafted upgrade file. A successful exploit could allow the attacker to upload crafted code to the affected device. Cisco Enterprise NFV Infrastructure Software (NFVIS) Exists in a digital signature validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Cisco Enterprise NFV Infrastructure Software (NFVIS) is a set of NVF infrastructure software platform of Cisco (Cisco). The platform can realize the full lifecycle management of virtualized services through the central coordinator and controller
| VAR-202002-0618 | CVE-2020-1860 | plural Huawei Product input verification vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet. NIP6800 , Secospace USG6600 , USG9500 There is an input verification vulnerability in.Information may be tampered with
| VAR-202002-0606 | CVE-2020-1877 | plural HUAWEI Product vulnerabilities to access to uninitialized pointers |
CVSS V2: 4.9 CVSS V3: 4.4 Severity: MEDIUM |
NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot. NIP6800 , Secospace USG6600 , USG9500 Exists in an uninitialized pointer access vulnerability.Service operation interruption (DoS) It may be put into a state
| VAR-202002-0607 | CVE-2020-1881 | plural HUAWEI Product exhaustion vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices. NIP6800 , Secospace USG6600 , USG9500 Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be put into a state
| VAR-202002-0605 | CVE-2020-1876 | plural Huawei Out-of-bounds write vulnerabilities in the product |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds write vulnerability. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. NIP6800 , Secospace USG6600 , USG9500 Is vulnerable to out-of-bounds writes.Service operation interruption (DoS) It may be put into a state
| VAR-202002-0604 | CVE-2020-1875 | plural Huawei Product vulnerabilities to access to uninitialized pointers |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when an abnormal condition occurs in certain operation. Successful exploit could cause certain process reboot. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500;USG9500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500
| VAR-202002-0599 | CVE-2020-1874 | plural HUAWEI Product vulnerabilities to access to uninitialized pointers |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: MEDIUM |
NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have a invalid pointer access vulnerability. The software system access an invalid pointer when operator logs in to the device and performs some operations. Successful exploit could cause certain process reboot. NIP6800 , Secospace USG6600 , USG9500 Exists in an uninitialized pointer access vulnerability.Service operation interruption (DoS) It may be put into a state
| VAR-202002-0598 | CVE-2020-1873 | plural Huawei Out-of-bounds read vulnerabilities in the product |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds read vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the device reboot. NIP6800 , Secospace USG6600 , USG9500 Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be put into a state
| VAR-202002-0614 | CVE-2020-1855 | plural Huawei Product input verification vulnerabilities |
CVSS V2: 3.6 CVSS V3: 6.1 Severity: MEDIUM |
Huawei HEGE-570 version 1.0.1.22(SP3); and HEGE-560, OSCA-550, OSCA-550A, OSCA-550AX, and OSCA-550X version 1.0.1.21(SP3) have an insufficient verification vulnerability. An attacker can access the device physically and exploit this vulnerability to tamper with device information. Successful exploit may cause service abnormal. plural Huawei The product contains an input verification vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. Huawei HEGE-570 is a smart screen device of China's Huawei company.
Input validation error vulnerabilities exist in many Huawei products
| VAR-202002-1226 | CVE-2020-6970 | Emerson OpenEnterprise SCADA Server Buffer Overflow Vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A Heap-based Buffer Overflow was found in Emerson OpenEnterprise SCADA Server 2.83 (if Modbus or ROC Interfaces have been installed and are in use) and all versions of OpenEnterprise 3.1 through 3.3.3, where a specially crafted script could execute code on the OpenEnterprise Server. Emerson OpenEnterprise SCADA Server Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Emerson Electric OpenEnterprise SCADA Server is a set of data acquisition and monitoring system (SCADA) servers for remote oil and gas applications from Emerson Electric. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
| VAR-202002-0461 | CVE-2019-18352 | PHOENIX CONTACT FL NAT 2208 and 2304-2GC-2SFP Unauthorized authentication vulnerabilities in devices |
CVSS V2: 4.3 CVSS V3: 8.2 Severity: HIGH |
Improper access control exists on PHOENIX CONTACT FL NAT 2208 devices before V2.90 and FL NAT 2304-2GC-2SFP devices before V2.90 when using MAC-based port security. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. No detailed vulnerability details are provided at this time
| VAR-202002-0597 | CVE-2020-1872 | Huawei smartphone P10 Plus Input verification vulnerability in |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
Huawei smart phones P10 Plus with versions earlier than 9.1.0.201(C01E75R1P12T8), earlier than 9.1.0.252(C185E2R1P9T8), earlier than 9.1.0.252(C432E4R1P9T8), and earlier than 9.1.0.255(C576E6R1P8T8) have a digital balance bypass vulnerability. When re-configuring the mobile phone at the digital balance mode, an attacker can perform some operations to bypass the startup wizard, and then open some switch. As a result, the digital balance function is bypassed. Huawei smartphone P10 Plus There is an input verification vulnerability in.Information may be tampered with.
There are security holes in Huawei smart phones P10 Plus
| VAR-202002-1691 | No CVE | Schneider Electric Modicon M580 has a denial of service vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Schneider Electric Modicon M580 is an Ethernet programmable controller.
Schneider Electric Modicon M580 has a denial of service vulnerability. An attacker can exploit this vulnerability by sending a carefully constructed 0x28 function code data packet to cause a denial of service.
| VAR-202002-1405 | CVE-2020-9031 | plural Symmetricom SyncServer Path traversal vulnerabilities in devices |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to daemonlog.php. plural Symmetricom SyncServer A path traversal vulnerability exists in the device.Information may be obtained and tampered with. Microsemi Symmetricom SyncServer S100 is a network time server of Microsemi Corporation of America. The vulnerability stems from network systems or products failing to properly filter special elements in resources or file paths. An attacker could use the vulnerability to access a location outside the restricted directory
| VAR-202002-1693 | No CVE | SIEMENS SIMATIC S7-200 Smart has weak password vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Siemens is the world's leading technology company. With innovations in the fields of electrification, automation and digitalization, Siemens provides customers with solutions in the fields of power generation and transmission and distribution, infrastructure, industrial automation, drives and software.
SIEMENS SIMATIC S7-200 Smart has a weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
| VAR-202002-1337 | CVE-2020-9020 | Iteris Vantage Velocity Field Unit operating system command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Iteris Vantage Velocity Field Unit 2.3.1, 2.4.2, and 3.0 devices allow the injection of OS commands into cgi-bin/timeconfig.py via shell metacharacters in the NTP Server field. (DoS) It may be put into a state
| VAR-202002-0493 | CVE-2019-18998 | ABB Asset Suite Access Control Error Vulnerability |
CVSS V2: 5.5 CVSS V3: 7.1 Severity: HIGH |
Insufficient access control in the web interface of ABB Asset Suite versions 9.0 to 9.3, 9.4 prior to 9.4.2.6, 9.5 prior to 9.5.3.2 and 9.6.0 enables full access to directly referenced objects. An attacker with knowledge of a resource's URL can access the resource directly. ABB Asset Suite Exists in a user-controlled key authentication evasion vulnerability.Information may be obtained and tampered with. ABB Asset Suite is a set of enterprise asset management solutions mainly used in the power generation industry by Swiss ABB company. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to obtain sensitive information on the website. The following products and versions are affected: ABB Asset Suite from version 9.0 to version 9.3, version 9.4 before 9.4.2.6, version 9.5 before 9.5.3.2, version 9.6.0