VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202011-0177 CVE-2020-12332 Intel(R) HID Event Filter Driver  Vulnerability in improperly holding permissions in the installer CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Improper permissions in the installer for the Intel(R) HID Event Filter Driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access
VAR-202011-0173 CVE-2020-12328 Windows  for  Intel(R) Thunderbolt(TM) DCH  Vulnerability related to information leakage in driver CVSS V2: 2.1
CVSS V3: 4.4
Severity: MEDIUM
Protection mechanism failure in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow a privileged user to potentially enable information disclosure via local access. Windows for Intel(R) Thunderbolt(TM) DCH The driver contains a vulnerability related to information leakage.Information may be obtained. Intel Thunderbolt DCH drivers is a driver for Windows from Intel Corporation of the United States
VAR-202011-0172 CVE-2020-12327 Windows  for  Intel(R) Thunderbolt(TM) DCH  Vulnerability in driver initialization of resources to unsafe default values CVSS V2: 2.1
CVSS V3: 4.4
Severity: MEDIUM
Insecure default variable initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow a privileged user to potentially enable information disclosure via local access. Windows for Intel(R) Thunderbolt(TM) DCH The driver contains a vulnerability in the initialization of resources to unsafe default values.Information may be obtained
VAR-202011-0171 CVE-2020-12326 Windows  for  Intel(R) Thunderbolt(TM) DCH  Driver initialization vulnerabilities CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Improper initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable information disclosure via local access. Windows for Intel(R) Thunderbolt(TM) DCH The driver contains an initialization vulnerability.Information may be obtained
VAR-202011-0170 CVE-2020-12325 Windows  for  Intel(R) Thunderbolt(TM) DCH  Buffer error vulnerability in driver CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable escalation of privilege via local access. Windows for Intel(R) Thunderbolt(TM) DCH The driver contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Thunderbolt DCH drivers is a driver for Windows from Intel Corporation of the United States
VAR-202011-0169 CVE-2020-12324 Windows  for  Intel(R) Thunderbolt(TM) DCH  Driver permission management vulnerabilities CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Protection mechanism failure in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable escalation of privilege via local access. Windows for Intel(R) Thunderbolt(TM) DCH The driver contains a vulnerability related to permission management.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Thunderbolt DCH drivers is a driver for Windows from Intel Corporation of the United States
VAR-202011-0149 CVE-2020-12307 Intel(R) High Definition Audio  Vulnerability in improper default permissions in driver CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Improper permissions in some Intel(R) High Definition Audio drivers before version 9.21.00.4561 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel High Definition Audio drivers is an audio codec driver from Intel Corporation. An authorization issue vulnerability exists in Intel High Definition Audio drivers. The vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. No detailed vulnerability details were provided at this time
VAR-202011-0146 CVE-2020-12303 Intel(R) CSME  and  TXE  Vulnerabilities in the use of freed memory CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Use after free in DAL subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access. Intel(R) CSME and TXE Is vulnerable to the use of freed memory.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202011-0144 CVE-2020-12356 Intel(R) AMT  Out-of-bounds read vulnerability CVSS V2: 2.1
CVSS V3: 4.4
Severity: MEDIUM
Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access. Intel(R) AMT Is vulnerable to an out-of-bounds read.Information may be obtained. Intel Active Management Technology (AMT) is a set of hardware-based computer remote active management technology software developed by Intel Corporation. The following products and versions are affected: Version 11.8.80, Version 11.12.80, Version 11.22.80, Version 12.0.70, Versions before 14.0.45
VAR-202011-0142 CVE-2020-12354 Intel(R) AMT SDK  Inappropriate Default Permission Vulnerability CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Incorrect default permissions in Windows(R) installer in Intel(R) AMT SDK versions before 14.0.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) AMT SDK Is vulnerable to incorrect default permissions.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202011-0143 CVE-2020-12355 Replay Protected Memory Block (RPMB) protocol does not adequately defend against replay attacks CVSS V2: 4.6
CVSS V3: 6.8
Severity: MEDIUM
Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. The Replay Protected Memory Block (RPMB) protocol found in several storage specifications does not securely protect against replay attacks. An attacker with physical access can deceive a trusted component about the status of an RPBM write command or the content of an RPMB area. The RPMB protocol "...enables a device to store data in a small, specific area that is authenticated and protected against replay attack." RPMB is most commonly found in mobile phones and tablets using flash storage technology such as eMMC, UFS, and NVMe. The RPMB protocol allows an attacker to replay stale write failure messages and write commands, leading to state confusion between a trusted component and the contents of an RPMB area. Additional details are available in Replay Attack Vulnerabilities in RPMB Protocol Applications. An attacker with physical access to a device can cause a mismatch between the write state or contents of the RPMB area and a trusted component of the device. These mismatches can lead to the trusted component believing a write command failed when in fact it succeeded, or the trusted component believing that certain content was written when in fact different content (unmodified by the attacker) was written. Further implications depend on the specific device and use of RPMB. At least one affected vendor has confirmed that denial of service . Intel(R) TXE Has Capture-replay An authentication bypass vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202011-0167 CVE-2020-12322 Intel(R) Wireless Bluetooth(R)  Input confirmation vulnerability CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
Improper input validation in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Intel(R) Wireless Bluetooth(R) Is vulnerable to input validation.Denial of service (DoS) It may be put into a state
VAR-201911-0635 CVE-2019-18845 Patriot Viper RGB Vulnerability in Permission Management CVSS V2: 3.6
CVSS V3: 7.1
Severity: HIGH
The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection. Patriot Viper RGB Contains a privilege management vulnerability.Information may be obtained and information may be altered. Patriot Viper RGB is a memory module device of Patriot company in Taiwan, China. A local attacker can use this vulnerability to perform read and write operations on memory at any location, thereby gaining NT AUTHORITYSYSTEM permissions
VAR-201911-1959 No CVE Unknown vulnerability in Amazon Ring Video Doorbell CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Amazon Ring Video Doorbell is a smart wireless home security doorbell camera that allows users to remotely control their doorbells. Amazon Ring Video Doorbell has a security vulnerability that originates from information shared between the application and the doorbell (including Wi-Fi passwords) transmitted over an unprotected HTTP connection. An attacker could use this vulnerability to obtain a user's Wi-Fi password .
VAR-201911-1948 No CVE Logical Defect Vulnerability in RG-SAM Campus Network Self-Service System CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Ruijie RG-SAM certification and billing management system can not only support a high degree of integration of software and hardware to form a highly available solution, but also add functions such as profit and value-added. It provides users with a flexible cooperation model and a clear-cut win-win cooperation solution, which can realize universities, Win-win situation among operators and students. The RG-SAM campus network self-service system has a logic defect vulnerability. Attackers can use the vulnerability to brute force the account.
VAR-201911-1953 No CVE Denial of Service Vulnerability in TP-LINK TL-WR703N Router CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
TP-LINK TL-WR703N is a mini wireless router of China TP-Link. The TP-LINK TL-WR703N router has a denial of service vulnerability. An attacker can send a special data packet to the router's WAN port IP address without having to pass user login authentication, which can cause an HTTP service denial response.
VAR-201911-1954 No CVE Denial of Service Vulnerability in TP-LINK TL-WR703N Router CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
TP-LINK TL-WR703N is a mini wireless router of China TP-Link. The TP-LINK TL-WR703N router has a denial-of-service vulnerability. An attacker does not need to pass user login authentication and can send a special data packet to the router's WAN port IP address to cause an HTTP service denial response.
VAR-201911-1309 CVE-2019-15704 FortiClient Vulnerable to information disclosure CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
A clear text storage of sensitive information vulnerability in FortiClient for Mac may allow a local attacker to read sensitive information logged in the console window when the user connects to an SSL VPN Gateway. FortiClient Contains an information disclosure vulnerability.Information may be obtained. Fortinet FortiClient is a mobile terminal security solution developed by Fortinet. The solution provides IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication when connected to FortiGate firewall appliances. There are security vulnerabilities in Fortinet FortiClient 6.2.0 and earlier versions and 6.0.7 and earlier versions based on the Mac OS platform. The vulnerability stems from the fact that the program stores sensitive information in plain text
VAR-201911-1048 CVE-2019-18240 Fuji Electric V-Server VPR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: 7.5
CVSS V3: 7.8
Severity: HIGH
In Fuji Electric V-Server 4.0.6 and prior, several heap-based buffer overflows have been identified, which may allow an attacker to remotely execute arbitrary code. Fuji Electric V-Server Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of VPR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Fuji Electric V-Server is a set of software used by Fuji Electric to collect and manage real-time field data. A buffer overflow vulnerability exists in Fuji Electric V-Server 4.0.6 and earlier. This vulnerability is caused by a network system or product performing an operation on memory that does not properly validate data boundaries, causing an error to be performed on other associated memory locations. Read and write operations that an attacker can exploit to cause a buffer overflow or heap overflow
VAR-201911-0372 CVE-2019-3764 Dell EMC iDRAC8 and iDRAC9 Vulnerable to unauthorized authentication CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
Dell EMC iDRAC7 versions prior to 2.65.65.65, iDRAC8 versions prior to 2.70.70.70 and iDRAC9 versions prior to 3.36.36.36 contain an improper authorization vulnerability. A remote authenticated malicious iDRAC user with low privileges may potentially exploit this vulnerability to obtain sensitive information such as password hashes. Dell EMC iDRAC8 and iDRAC9 Contains an unauthorized authentication vulnerability.Information may be obtained. Dell EMC iDRAC9 and others are products of Dell (Dell). This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products