VARIoT IoT vulnerabilities database
| VAR-201912-0683 | CVE-2019-18832 | Barco ClickShare Button R9861500D01 Vulnerability related to information leak from cache in device |
CVSS V2: 6.8 CVSS V3: 8.1 Severity: HIGH |
Barco ClickShare Button R9861500D01 devices before 1.9.0 have incorrect Credentials Management. The ClickShare Button implements encryption at rest which uses a one-time programmable (OTP) AES encryption key. This key is shared across all ClickShare Buttons of model R9861500D01. Barco ClickShare Button R9861500D01 The device contains a vulnerability related to information disclosure from the cache.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Attackers could use this vulnerability to forge arbitrary software images
| VAR-201912-0684 | CVE-2019-18833 | Barco ClickShare Button R9861500D01 Vulnerability related to lack of encryption of critical data on devices |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
Barco ClickShare Button R9861500D01 devices before 1.9.0 allow Information exposure (issue 2 of 2).. The encryption key of the media content which is shared between a ClickShare Button and a ClickShare Base Unit is randomly generated for each new session and communicated over a TLS connection. An attacker who is able to perform a Man-in-the-Middle attack between the TLS connection, is able to obtain the encryption key. Barco ClickShare Button R9861500D01 The device contains a vulnerability related to the lack of encryption of critical data.Information may be obtained. Barco ClickShare Button R9861500D01 is a wireless control device for the demonstration system of Barco, Belgium
| VAR-201912-0691 | CVE-2019-18824 | Barco ClickShare Button R9861500D01 Vulnerability related to input validation on devices |
CVSS V2: 6.9 CVSS V3: 6.6 Severity: MEDIUM |
Barco ClickShare Button R9861500D01 devices before 1.10.0.13 have Missing Support for Integrity Check. The ClickShare Button does not verify the integrity of the mutable content on the UBIFS partition before being used. Barco ClickShare Button R9861500D01 The device contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An attacker can use this vulnerability to open a backdoor to the device and present specially crafted data to the user
| VAR-201912-0999 | CVE-2019-18267 | GE S2020 and S2020G Fast Switch 61850 Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
An issue was found in GE S2020/S2020G Fast Switch 61850, S2020/S2020G Fast Switch 61850 Versions 07A03 and prior. An attacker can inject arbitrary Javascript in a specially crafted HTTP request that may be reflected back in the HTTP response. The device is also vulnerable to a stored cross-site scripting vulnerability that may allow session hijacking, disclosure of sensitive data, cross-site request forgery (CSRF) attacks, and remote code execution. GE S2020 and S2020G Fast Switch 61850 Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. An attacker could use this vulnerability to inject arbitrary code
| VAR-201912-0680 | CVE-2019-18829 | Barco ClickShare Button R9861500D01 Unreliable search path vulnerability in device |
CVSS V2: 4.4 CVSS V3: 7.8 Severity: HIGH |
Barco ClickShare Button R9861500D01 devices before 1.10.0.13 have Missing Support for Integrity Check. The Barco signed 'Clickshare_For_Windows.exe' binary on the ClickShare Button (R9861500D01) loads a number of DLL files dynamically without verifying their integrity. Barco ClickShare Button R9861500D01 The device contains an untrusted search path vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Attackers can use this vulnerability to inject arbitrary code
| VAR-201912-0828 | CVE-2019-7481 | SonicWall SMA100 Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Vulnerability in SonicWall SMA100 allow unauthenticated user to gain read-only access to unauthorized resources. This vulnerablity impacted SMA100 version 9.0.0.3 and earlier. SonicWall SMA100 Contains an information disclosure vulnerability.Information may be obtained. SonicWall SMA100 is a secure access gateway device from SonicWall, USA
| VAR-201912-1997 | CVE-2019-7405 | TP-Link Archer Router Unauthenticated Access Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
TP-Link Archer is a wireless router of China TP-Link company.
The TP-Link Archer router has an unauthenticated access vulnerability. An attacker can use this vulnerability to reset the administrator password by constructing a malicious attack script.
| VAR-201912-0777 | CVE-2019-5078 | WAGO PFC200 Access Control Error Vulnerability |
CVSS V2: 9.4 CVSS V3: 9.1 Severity: CRITICAL |
An exploitable denial of service vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a denial of service, resulting in the device entering an error state where it ceases all network communications. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 Firmware is vulnerable to a lack of authentication for critical functions.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. WAGO PFC200 is a programmable logic controller (PLC) from the German company WAGO.
WAGO PFC200 has an access control error vulnerability
| VAR-201912-0682 | CVE-2019-18831 | Barco ClickShare Button Information disclosure vulnerability in devices |
CVSS V2: 3.5 CVSS V3: 5.3 Severity: MEDIUM |
Barco ClickShare Button R9861500D01 devices before 1.9.0 allow Information Exposure. The encrypted ClickShare Button firmware contains the private key of a test device-certificate. Attackers can use this vulnerability to disclose information
| VAR-201912-0693 | CVE-2019-18826 | Barco ClickShare Button R9861500D01 Device validation vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Barco ClickShare Button R9861500D01 devices before 1.9.0 have Improper Following of a Certificate's Chain of Trust. The embedded 'dongle_bridge' program used to expose the functionalities of the ClickShare Button to a USB host, does not properly validate the whole certificate chain. Barco ClickShare Button R9861500D01 The device contains a certificate validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Attackers can use this vulnerability to authenticate and gain access to restricted commands
| VAR-201912-0779 | CVE-2019-5080 | WAGO PFC 200 and PFC100 Vulnerability related to lack of certification for critical functions in firmware |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
An exploitable denial-of-service vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A single packet can cause a denial of service and weaken credentials resulting in the default documented credentials being applied to the device. An attacker can send an unauthenticated packet to trigger this vulnerability. WAGO PFC 200 and PFC100 Firmware is vulnerable to a lack of authentication for critical functions.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. WAGO PFC200 and WAGO PFC100 are both programmable logic controllers (PLCs) from the German company WAGO. Attackers can Exploitation of this vulnerability resulted in a denial of service
| VAR-201912-0774 | CVE-2019-5075 | WAGO PFC200 Buffer Overflow Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An exploitable stack buffer overflow vulnerability exists in the command line utility getcouplerdetails of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets sent to the iocheckd service "I/O-Check" can cause a stack buffer overflow in the sub-process getcouplerdetails, resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. WAGO PFC200 is a programmable logic controller (PLC) from the German company WAGO.
WAGO PFC200 has a buffer overflow vulnerability
| VAR-201912-0679 | CVE-2019-18828 | Barco ClickShare Button Vulnerability related to information leak from cache in device |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
Barco ClickShare Button R9861500D01 devices before 1.9.0 have Insufficiently Protected Credentials. The root account (present for access via debug interfaces, which are by default not enabled on production devices) of the embedded Linux on the ClickShare Button is using a weak password. Barco ClickShare Button The device contains a vulnerability related to information disclosure from the cache.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The vulnerability originated from the program's insufficient protection of credentials, and an attacker could use this vulnerability to gain root user identity
| VAR-201912-1420 | CVE-2019-19743 |
D-Link DIR-615 Input Validation Error Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201912-0028 |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
On D-Link DIR-615 devices, a normal user is able to create a root(admin) user from the D-Link portal. D-Link DIR-615 The device contains an input validation vulnerability.Information may be tampered with. D-Link DIR-615 is a wireless router from Taiwan D-Link. An attacker could use this vulnerability to create a root (admin) user
| VAR-201912-0780 | CVE-2019-5081 | WAGO PFC 200 and PFC100 Classic buffer overflow vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An exploitable heap buffer overflow vulnerability exists in the iocheckd service ''I/O-Chec'' functionality of WAGO PFC 200 Firmware version 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC200 is a programmable logic controller (PLC) from the German company WAGO.
WAGO PFC200 has a buffer overflow vulnerability
| VAR-201912-0773 | CVE-2019-5074 | WAGO PFC 200 and PFC100 Classic buffer overflow vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An exploitable stack buffer overflow vulnerability exists in the iocheckd service ''I/O-Check'' functionality of WAGO PFC200 Firmware version 03.01.07(13), WAGO PFC200 Firmware version 03.00.39(12) and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a stack buffer overflow, resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 The firmware contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. WAGO PFC 200 is a programmable logic controller (PLC) from the German company WAGO.
A buffer overflow vulnerability exists in the I / O-Check function in WAGO PFC 200. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
| VAR-202001-0422 | CVE-2019-5082 | WAGO PFC 200 and PFC100 Out-of-bounds write vulnerability in firmware |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An exploitable heap buffer overflow vulnerability exists in the iocheckd service I/O-Check functionality of WAGO PFC200 Firmware version 03.01.07(13), WAGO PFC200 Firmware version 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 Firmware contains an out-of-bounds write vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. WAGO PFC 200 and WAGO PFC100 are both programmable logic controllers (PLCs) from the German company WAGO.
There is a buffer overflow vulnerability in the 'I / O-Check' function in WAGO PFC200 and PFC100. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations
| VAR-201912-0776 | CVE-2019-5077 | WAGO PFC 200 and PFC100 Vulnerability related to lack of certification for critical functions in firmware |
CVSS V2: 8.5 CVSS V3: 9.1 Severity: CRITICAL |
An exploitable denial-of-service vulnerability exists in the iocheckd service ‘’I/O-Chec’’ functionality of WAGO PFC 200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC 100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a denial of service, resulting in the device entering an error state where it ceases all network communications. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 Firmware is vulnerable to a lack of authentication for critical functions.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. WAGO PFC200 is a programmable logic controller (PLC) from the German company WAGO.
WAGO PFC200 has an access control error vulnerability
| VAR-201912-1836 | CVE-2019-16779 | RubyGem excon Input validation vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this. RubyGem excon Contains an input validation vulnerability.Information may be obtained. RubyGem excon is an HTTP server for Ruby applications.
There are security vulnerabilities in RubyGem excon versions prior to 0.71.0. An attacker could use this vulnerability to leak information
| VAR-201912-0678 | CVE-2019-18827 | Barco ClickShare Button R9861500D01 Vulnerability related to input validation on devices |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
On Barco ClickShare Button R9861500D01 devices (before firmware version 1.9.0) JTAG access is disabled after ROM code execution. This means that JTAG access is possible when the system is running code from ROM before handing control over to embedded firmware. Barco ClickShare Button R9861500D01 The device contains an input validation vulnerability.Information may be obtained