VARIoT IoT vulnerabilities database
| VAR-202001-0592 | CVE-2019-18273 | OSIsoft PI Vision Cross-Site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
OSIsoft PI Vision, PI Vision 2017 R2 and PI Vision 2017 R2 SP1. The affected product is vulnerable to cross-site scripting, which may allow invalid input to be introduced. OSIsoft PI Vision Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. OSIsoft PI Vision is a set of commercialized software application platform based on Ckient / Server structure of OSIsoft Company in the United States, which supports data collection, analysis and visualization
| VAR-202001-1850 | CVE-2019-19278 | SIEMENS SINAMICS PERFECT HARMONY GH180 Access control vulnerability |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
A vulnerability has been identified in SINAMICS PERFECT HARMONY GH180 Drives MLFB 6SR32..-.....-.... MLFB 6SR4...-.....-.... MLFB 6SR5...-.....-.... With option A30 (HMIs 12 inches or larger) (All versions), SINAMICS PERFECT HARMONY GH180 Drives MLFB 6SR325.-.....-.... (High Availability) (All versions). The affected device contains a vulnerability that could allow an unauthenticated attacker to restore the affected device to a point where predefined application and operating system protection mechanisms are not in place. Successful exploitation requires physical access to the system, but no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentialiy, integrity and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known. plural SINAMICS PERFECT HARMONY GH180 The device contains an input validation vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. The SINAMICS Perfect Harmony GH180 medium voltage inverter series is used to control medium voltage inverters or inverters in various applications. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided
| VAR-202001-0751 | CVE-2019-13524 | plural GE PACSystems RX3i Input validation vulnerabilities in products |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
GE PACSystems RX3i CPE100/115: All versions prior to R9.85,CPE302/305/310/330/400/410: All versions prior to R9.90,CRU/320 All versions(End of Life) may allow an attacker sending specially manipulated packets to cause the module state to change to halt-mode, resulting in a denial-of-service condition. An operator must reboot the CPU module after removing battery or energy pack to recover from halt-mode. plural GE PACSystems RX3i The product contains an input validation vulnerability.Denial of service (DoS) May be in a state. GE PACSystems is a programmable automation controller product from GE
| VAR-202001-0420 | CVE-2019-3981 | MikroTik Winbox Input validation vulnerability |
CVSS V2: 4.3 CVSS V3: 3.7 Severity: LOW |
MikroTik Winbox 3.20 and below is vulnerable to man in the middle attacks. A man in the middle can downgrade the client's authentication protocol and recover the user's username and MD5 hashed password. MikroTik Winbox Contains an input validation vulnerability.Information may be obtained. A security vulnerability exists in MikroTik Winbox 3.20 and earlier versions
| VAR-202001-0125 | CVE-2020-0606 | .NET Framework and .NET Core Vulnerable to remote code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0605
| VAR-202006-0667 | CVE-2019-6196 | plural Lenovo installation Unreliable search path vulnerabilities in packages |
CVSS V2: 6.9 CVSS V3: 7.3 Severity: HIGH |
A symbolic link vulnerability in some Lenovo installation packages, prior to version 1.2.9.3, could allow privileged file operations during file extraction and installation. plural Lenovo installation The package contains a vulnerability in an unreliable search path.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. There is a code problem vulnerability in the Lenovo installation package before 1.2.9.3. A local attacker could exploit this vulnerability via a specially crafted symbolic link to gain elevated privileges
| VAR-202006-0601 | CVE-2019-6173 | plural Lenovo installation Unreliable search path vulnerabilities in packages |
CVSS V2: 6.9 CVSS V3: 6.5 Severity: MEDIUM |
A DLL search path vulnerability could allow privilege escalation in some Lenovo installation packages, prior to version 1.2.9.3, during installation if an attacker already has administrative privileges. plural Lenovo installation The package contains a vulnerability in an unreliable search path.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. There is a code problem vulnerability in the Lenovo installation package before 1.2.9.3. An attacker could exploit this vulnerability to elevate privileges
| VAR-202001-1699 | CVE-2020-5853 | BIG-IP APM portal access Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
In BIG-IP APM portal access on versions 15.0.0-15.1.0, 14.0.0-14.1.2.3, 13.1.0-13.1.3.2, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, when backend servers serve HTTP pages with special JavaScript code, this can lead to internal portal access name conflict. BIG-IP APM portal access Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. F5 BIG-IP APM is a set of access and security solutions from F5 Corporation of the United States. The product provides unified access to business-critical applications and networks. A cross-site scripting vulnerability exists in F5 BIG-IP APM. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code. The following products and versions are affected: F5 BIG-IP APM 15.0.0 to 15.1.0, 14.0.0 to 14.1.2, 13.1.0 to 13.1.3, 12.1.0 to 12.1. 5 version, 11.5.2 version to 11.6.5 version
| VAR-202001-0503 | CVE-2019-16153 | Fortinet FortiSIEM Vulnerable to use of hard-coded credentials |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A hard-coded password vulnerability in the Fortinet FortiSIEM database component version 5.2.5 and below may allow attackers to access the device database via the use of static credentials. Fortinet FortiSIEM Contains a vulnerability involving the use of hard-coded credentials.Information is acquired, information is falsified, and denial of service (DoS) May be in a state
| VAR-202001-0482 | CVE-2019-14596 | Intel(R) Chipset Device Software INF Utility Vulnerable to unauthorized authentication |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Improper access control in the installer for Intel(R) Chipset Device Software INF Utility before version 10.1.18 may allow an authenticated user to potentially enable denial of service via local access. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202001-1697 | CVE-2020-5851 | plural BIG-IP Product vulnerabilities |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG. plural BIG-IP The product contains unspecified vulnerabilities.Information may be altered
| VAR-202001-1989 | No CVE | Beijing Gateway Technology Co., Ltd. Smart Gateway Has Unauthorized Access Vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Smart Gateway is a multi-service converged gateway that integrates wireless controller (AC), router and firewall features independently developed by Beijing BiLian Technology Co., Ltd.
There is an unauthorized access vulnerability in the Smart Gateway of Beijing Brilliant Technology Co., Ltd. Attackers can use this vulnerability to perform unauthorized operations, such as viewing and modifying other accounts.
| VAR-202001-1966 | No CVE | Logical Defect Vulnerability in Beijing Gateway Technology Co., Ltd. Smart Gateway |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Smart Gateway is a multi-service converged gateway that integrates wireless controller (AC), router and firewall features independently developed by Beijing BiLian Technology Co., Ltd.
There is a logic flaw in the Smart Gateway of Beijing Bilin Technology Co., Ltd. Attackers forge cookie identity information through a browser and log on to the system.
| VAR-202001-1602 | CVE-2020-5195 | Cerberus FTP Server Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Reflected XSS through an IMG element in Cerberus FTP Server prior to versions 11.0.1 and 10.0.17 allows a remote attacker to execute arbitrary JavaScript or HTML via a crafted public folder URL. This occurs because of the folder_up.png IMG element not properly sanitizing user-inserted directory paths. The path modification must be done on a publicly shared folder for a remote attacker to insert arbitrary JavaScript or HTML. The vulnerability impacts anyone who clicks the malicious link crafted by the attacker. Cerberus FTP Server Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. Cerberus FTP Server is a multi-channel Windows FTP server. In addition to the regular FTP functions, it also provides users with file access and management permissions, and can perform connection restrictions, time, IP access, and multipath priority settings
| VAR-202001-1708 | CVE-2020-6848 | Axper Vision II Cross-site scripting vulnerability in devices |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Axper Vision II 4 devices allow XSS via the DEVICE_NAME (aka Device Name) parameter to the configWebParams.cgi URI. Axper Vision II The device contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. FLIR Brickstream 2300 is a customer flow analysis and statistics equipment of Canada FLIR company. An access control error vulnerability exists in the getConfigExportFile.cgi file in FLIR Brickstream 2300 version 2.0 4.1.53.166. An attacker could exploit this vulnerability to obtain information
| VAR-202001-1995 | No CVE | ZTE ZXR10 1800-2S has a directory traversal vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ZXR10 1800-2S is a router product of ZTE Corporation of China.
ZTE ZXR10 1800-2S has a directory traversal vulnerability. Attackers can use this vulnerability to browse the website directory arbitrarily, leading to the disclosure of website privacy files and directories.
| VAR-202001-1971 | No CVE | Command execution vulnerability in background of JX-J835-R835R router |
CVSS V2: 7.6 CVSS V3: - Severity: HIGH |
JCG JHR-N835R, with USB shared storage, shared printer and other functions. It still continues the high-power characteristics of the King Kong series, with three external antennas for stronger signals. The power of the machine can be adjusted according to the needs of the three gears. It is the best choice for wireless Internet access in homes and small office areas.
JCG JHR-N835R router has a command execution vulnerability in the background. Attackers can use this leak to execute arbitrary malicious commands.
| VAR-202001-1967 | No CVE | ZTE ZSRV2 Series Multi-Service Router Has Arbitrary File Reading Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ZXR10 ZSR V2 series router is a next-generation intelligent access router product integrating routing, switching, wireless, security, VPN, and AC introduced by ZTE. The product uses the industry-leading hardware platform and software architecture to build Efficient, reliable, flexible and easy-to-maintain enterprise intelligence network provides an intelligent and flexible equipment platform.
The ZTE ZSRV2 series multi-service router has an arbitrary file reading vulnerability. An attacker can use this vulnerability without logging in. You can access any file by sending malicious messages.
| VAR-202001-1968 | No CVE | D-link DIR-629 has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
D-Link DIR-629 450M Wireless Router 3 high-power blade antenna home broadband routers.
D-link DIR-629 has an unauthorized access vulnerability that could allow an attacker to gain unauthorized access to sensitive information.
| VAR-202001-1980 | No CVE | H3C S5120V2-SI Series Switch Has Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
H3C S5120V2-SI switch is a Layer 2 Gigabit Ethernet switch product independently developed by Xinhua III Technology Co., Ltd. (hereinafter referred to as H3C company). It is the second design for network environments that require high performance, high port density and easy installation. Generation of intelligent network manageable switches. In an enterprise network, it can provide Gigabit to desktop applications as an access device; in a metropolitan area network or industry users, it can provide Gigabit access to end users or tandem low-end switches, and up through Gigabit Gigabit Fiber or link aggregation is aggregated to a large-capacity L3 switch.
The H3C S5120V2-52P-SI switch has a denial of service vulnerability. An attacker can use this vulnerability to construct a special data message to bypass the access control list (ACL), which causes the TELNET service to refuse to respond and the switch to leave the management.