VARIoT IoT vulnerabilities database
| VAR-202011-0177 | CVE-2020-12332 | Intel(R) HID Event Filter Driver Vulnerability in improperly holding permissions in the installer |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper permissions in the installer for the Intel(R) HID Event Filter Driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access
| VAR-202011-0173 | CVE-2020-12328 | Windows for Intel(R) Thunderbolt(TM) DCH Vulnerability related to information leakage in driver |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
Protection mechanism failure in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow a privileged user to potentially enable information disclosure via local access. Windows for Intel(R) Thunderbolt(TM) DCH The driver contains a vulnerability related to information leakage.Information may be obtained. Intel Thunderbolt DCH drivers is a driver for Windows from Intel Corporation of the United States
| VAR-202011-0172 | CVE-2020-12327 | Windows for Intel(R) Thunderbolt(TM) DCH Vulnerability in driver initialization of resources to unsafe default values |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
Insecure default variable initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow a privileged user to potentially enable information disclosure via local access. Windows for Intel(R) Thunderbolt(TM) DCH The driver contains a vulnerability in the initialization of resources to unsafe default values.Information may be obtained
| VAR-202011-0171 | CVE-2020-12326 | Windows for Intel(R) Thunderbolt(TM) DCH Driver initialization vulnerabilities |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Improper initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable information disclosure via local access. Windows for Intel(R) Thunderbolt(TM) DCH The driver contains an initialization vulnerability.Information may be obtained
| VAR-202011-0170 | CVE-2020-12325 | Windows for Intel(R) Thunderbolt(TM) DCH Buffer error vulnerability in driver |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable escalation of privilege via local access. Windows for Intel(R) Thunderbolt(TM) DCH The driver contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Thunderbolt DCH drivers is a driver for Windows from Intel Corporation of the United States
| VAR-202011-0169 | CVE-2020-12324 | Windows for Intel(R) Thunderbolt(TM) DCH Driver permission management vulnerabilities |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Protection mechanism failure in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable escalation of privilege via local access. Windows for Intel(R) Thunderbolt(TM) DCH The driver contains a vulnerability related to permission management.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Thunderbolt DCH drivers is a driver for Windows from Intel Corporation of the United States
| VAR-202011-0149 | CVE-2020-12307 | Intel(R) High Definition Audio Vulnerability in improper default permissions in driver |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper permissions in some Intel(R) High Definition Audio drivers before version 9.21.00.4561 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel High Definition Audio drivers is an audio codec driver from Intel Corporation. An authorization issue vulnerability exists in Intel High Definition Audio drivers. The vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. No detailed vulnerability details were provided at this time
| VAR-202011-0146 | CVE-2020-12303 | Intel(R) CSME and TXE Vulnerabilities in the use of freed memory |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Use after free in DAL subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access. Intel(R) CSME and TXE Is vulnerable to the use of freed memory.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202011-0144 | CVE-2020-12356 | Intel(R) AMT Out-of-bounds read vulnerability |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access. Intel(R) AMT Is vulnerable to an out-of-bounds read.Information may be obtained. Intel Active Management Technology (AMT) is a set of hardware-based computer remote active management technology software developed by Intel Corporation. The following products and versions are affected: Version 11.8.80, Version 11.12.80, Version 11.22.80, Version 12.0.70, Versions before 14.0.45
| VAR-202011-0142 | CVE-2020-12354 | Intel(R) AMT SDK Inappropriate Default Permission Vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Incorrect default permissions in Windows(R) installer in Intel(R) AMT SDK versions before 14.0.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) AMT SDK Is vulnerable to incorrect default permissions.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202011-0143 | CVE-2020-12355 | Replay Protected Memory Block (RPMB) protocol does not adequately defend against replay attacks |
CVSS V2: 4.6 CVSS V3: 6.8 Severity: MEDIUM |
Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. The Replay Protected Memory Block (RPMB) protocol found in several storage specifications does not securely protect against replay attacks. An attacker with physical access can deceive a trusted component about the status of an RPBM write command or the content of an RPMB area. The RPMB protocol "...enables a device to store data in a small, specific area that is authenticated and protected against replay attack." RPMB is most commonly found in mobile phones and tablets using flash storage technology such as eMMC, UFS, and NVMe. The RPMB protocol allows an attacker to replay stale write failure messages and write commands, leading to state confusion between a trusted component and the contents of an RPMB area. Additional details are available in Replay Attack Vulnerabilities in RPMB Protocol Applications. An attacker with physical access to a device can cause a mismatch between the write state or contents of the RPMB area and a trusted component of the device. These mismatches can lead to the trusted component believing a write command failed when in fact it succeeded, or the trusted component believing that certain content was written when in fact different content (unmodified by the attacker) was written. Further implications depend on the specific device and use of RPMB. At least one affected vendor has confirmed that denial of service . Intel(R) TXE Has Capture-replay An authentication bypass vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202011-0167 | CVE-2020-12322 | Intel(R) Wireless Bluetooth(R) Input confirmation vulnerability |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
Improper input validation in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Intel(R) Wireless Bluetooth(R) Is vulnerable to input validation.Denial of service (DoS) It may be put into a state
| VAR-201911-0635 | CVE-2019-18845 | Patriot Viper RGB Vulnerability in Permission Management |
CVSS V2: 3.6 CVSS V3: 7.1 Severity: HIGH |
The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection. Patriot Viper RGB Contains a privilege management vulnerability.Information may be obtained and information may be altered. Patriot Viper RGB is a memory module device of Patriot company in Taiwan, China. A local attacker can use this vulnerability to perform read and write operations on memory at any location, thereby gaining NT AUTHORITYSYSTEM permissions
| VAR-201911-1959 | No CVE | Unknown vulnerability in Amazon Ring Video Doorbell |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Amazon Ring Video Doorbell is a smart wireless home security doorbell camera that allows users to remotely control their doorbells.
Amazon Ring Video Doorbell has a security vulnerability that originates from information shared between the application and the doorbell (including Wi-Fi passwords) transmitted over an unprotected HTTP connection. An attacker could use this vulnerability to obtain a user's Wi-Fi password .
| VAR-201911-1948 | No CVE | Logical Defect Vulnerability in RG-SAM Campus Network Self-Service System |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Ruijie RG-SAM certification and billing management system can not only support a high degree of integration of software and hardware to form a highly available solution, but also add functions such as profit and value-added. It provides users with a flexible cooperation model and a clear-cut win-win cooperation solution, which can realize universities, Win-win situation among operators and students.
The RG-SAM campus network self-service system has a logic defect vulnerability. Attackers can use the vulnerability to brute force the account.
| VAR-201911-1953 | No CVE | Denial of Service Vulnerability in TP-LINK TL-WR703N Router |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
TP-LINK TL-WR703N is a mini wireless router of China TP-Link.
The TP-LINK TL-WR703N router has a denial of service vulnerability. An attacker can send a special data packet to the router's WAN port IP address without having to pass user login authentication, which can cause an HTTP service denial response.
| VAR-201911-1954 | No CVE | Denial of Service Vulnerability in TP-LINK TL-WR703N Router |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
TP-LINK TL-WR703N is a mini wireless router of China TP-Link.
The TP-LINK TL-WR703N router has a denial-of-service vulnerability. An attacker does not need to pass user login authentication and can send a special data packet to the router's WAN port IP address to cause an HTTP service denial response.
| VAR-201911-1309 | CVE-2019-15704 | FortiClient Vulnerable to information disclosure |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
A clear text storage of sensitive information vulnerability in FortiClient for Mac may allow a local attacker to read sensitive information logged in the console window when the user connects to an SSL VPN Gateway. FortiClient Contains an information disclosure vulnerability.Information may be obtained. Fortinet FortiClient is a mobile terminal security solution developed by Fortinet. The solution provides IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication when connected to FortiGate firewall appliances. There are security vulnerabilities in Fortinet FortiClient 6.2.0 and earlier versions and 6.0.7 and earlier versions based on the Mac OS platform. The vulnerability stems from the fact that the program stores sensitive information in plain text
| VAR-201911-1048 | CVE-2019-18240 | Fuji Electric V-Server VPR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: 7.5 CVSS V3: 7.8 Severity: HIGH |
In Fuji Electric V-Server 4.0.6 and prior, several heap-based buffer overflows have been identified, which may allow an attacker to remotely execute arbitrary code. Fuji Electric V-Server Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of VPR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Fuji Electric V-Server is a set of software used by Fuji Electric to collect and manage real-time field data.
A buffer overflow vulnerability exists in Fuji Electric V-Server 4.0.6 and earlier. This vulnerability is caused by a network system or product performing an operation on memory that does not properly validate data boundaries, causing an error to be performed on other associated memory locations. Read and write operations that an attacker can exploit to cause a buffer overflow or heap overflow
| VAR-201911-0372 | CVE-2019-3764 | Dell EMC iDRAC8 and iDRAC9 Vulnerable to unauthorized authentication |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
Dell EMC iDRAC7 versions prior to 2.65.65.65, iDRAC8 versions prior to 2.70.70.70 and iDRAC9 versions prior to 3.36.36.36 contain an improper authorization vulnerability. A remote authenticated malicious iDRAC user with low privileges may potentially exploit this vulnerability to obtain sensitive information such as password hashes. Dell EMC iDRAC8 and iDRAC9 Contains an unauthorized authentication vulnerability.Information may be obtained. Dell EMC iDRAC9 and others are products of Dell (Dell). This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products