VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202010-1066 CVE-2018-19953 QNAP Systems TS-870 cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109. QTS Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. QNAP Systems TS-870 is a NAS (Network Attached Storage) device of China QNAP Systems. A cross-site scripting vulnerability exists in QNAP Systems TS-870 using firmware version 4.3.4.0486
VAR-202011-1202 CVE-2018-19952 QNAP Systems TS-870 SQL injection vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
If exploited, this SQL injection vulnerability could allow remote attackers to obtain application information. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. QNAP Systems TS-870 is a NAS (Network Attached Storage) device of China QNAP Systems. A security vulnerability exists in QNAP Systems TS-870 using firmware version 4.3.4.0486. An attacker can use this vulnerability to use LIMIT and retrieve data
VAR-202011-1207 CVE-2018-19951 QNAP Systems TS-870 cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. Music Station Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with. QNAP Systems TS-870 is a NAS (Network Attached Storage) device of China QNAP Systems. The vulnerability stems from the lack of correct verification of client data in the WEB application. An attacker can use this vulnerability to execute client code
VAR-202011-1205 CVE-2018-19956 Photo Station Cross-site scripting vulnerability in CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10. QNAP Systems TS-870 is a NAS (Network Attached Storage) device of China QNAP Systems. The vulnerability stems from the lack of correct verification of client data in the WEB application
VAR-201909-0594 CVE-2019-16057 D-Link DNS-320 In OS Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection. D-Link DNS-320 Is OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-Link DNS-320 is a dual-bay ShareCenter series NAS storage device. A remote unauthenticated attacker could use this vulnerability to access all application commands with root privileges
VAR-201909-1490 CVE-2019-11166 Intel(R) Easy Streaming Wizard Vulnerability in Permission Management CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Improper file permissions in the installer for Intel(R) Easy Streaming Wizard before version 2.1.0731 may allow an authenticated user to potentially enable escalation of privilege via local attack. Intel(R) Easy Streaming Wizard Contains a privilege management vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Easy Streaming Wizard is a set of streaming media transmission (live broadcast) configuration software developed by Intel Corporation. A local attacker could exploit this vulnerability to elevate privileges
VAR-201909-1667 No CVE Shenzhen Long Brother Digital Lock Co., Ltd. OKLOK Smart Door Latches in Logic Design Vulnerability CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
Shenzhen Long Brother Digital Lock Co., Ltd. is a modern enterprise integrating R & D, production and sales. Shenzhen Long Brother Digital Lock Co., Ltd. OKLOK smart door latches a loophole in the logic design. Attackers can use vulnerabilities to view other people's binding information, obtain sensitive information, and perform unauthorized operations.
VAR-201909-0780 CVE-2019-16313 ifw8 Router ROM Vulnerable to information leak from cache CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
ifw8 Router ROM v4.31 allows credential disclosure by reading the action/usermanager.htm HTML source code. Zhifeng Technology ifw8 Router ROM is a router operating system developed by China Zhifeng Technology Company
VAR-201909-0862 CVE-2019-13918 Siemens SINEMA Remote Connect Server Password guessing vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). The web interface has no means to prevent password guessing attacks. The vulnerability could be exploited by an attacker with network access to the vulnerable software, requiring no privileges and no user interaction. The vulnerability could allow full access to the web interface. At the time of advisory publication no public exploitation of this security vulnerability was known. SINEMA Remote Connect Server Contains a vulnerability related to weak password requests.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SINEMA Remote Connect helps users access remote devices or machines for easy and safe maintenance. The platform is mainly used for remote access, maintenance, control and diagnosis of the underlying network
VAR-201909-1510 CVE-2019-13919 Siemens SINEMA Remote Connect Server Unprivileged User Access Vulnerability CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). Some pages that should only be accessible by a privileged user can also be accessed by a non-privileged user. The security vulnerability could be exploited by an attacker with network access and valid credentials for the web interface. No user interaction is required. The vulnerability could allow an attacker to access information that he should not be able to read. The affected information does not include passwords. At the time of advisory publication no public exploitation of this security vulnerability was known. SINEMA Remote Connect helps users access remote devices or machines for easy and safe maintenance. The platform is mainly used for remote access, maintenance, control and diagnosis of the underlying network
VAR-201909-0863 CVE-2019-13920 Siemens SINEMA Remote Connect Server Cross-Site Request Forgery Vulnerability CVSS V2: 4.3
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). Some parts of the web application are not protected against Cross Site Request Forgery (CSRF) attacks. The security vulnerability could be exploited by an attacker that is able to trigger requests of a logged-in user to the application. The vulnerability could allow switching the connectivity state of a user or a device. At the time of advisory publication no public exploitation of this security vulnerability was known. SINEMA Remote Connect helps users access remote devices or machines for easy and safe maintenance. The platform is mainly used for remote access, maintenance, control and diagnosis of the underlying network
VAR-201909-1515 CVE-2019-13922 SINEMA Remote Connect Server Vulnerabilities in the use of weak password hashes CVSS V2: 4.0
CVSS V3: 2.7
Severity: LOW
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). An attacker with administrative privileges can obtain the hash of a connected device's password. The security vulnerability could be exploited by an attacker with network access to the SINEMA Remote Connect Server and administrative privileges. At the time of advisory publication no public exploitation of this security vulnerability was known. The platform is mainly used for remote access, maintenance, control and diagnosis of the underlying network
VAR-201909-0084 CVE-2019-9009 3S-Smart CODESYS  Input verification vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An issue was discovered in 3S-Smart CODESYS before 3.5.15.0 . Crafted network packets cause the Control Runtime to crash. 3S-Smart CODESYS There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state. 3S-Smart Software Solutions CODESYS Control is a set of industrial control program programming software from Germany 3S-Smart Software Solutions. A security vulnerability exists in 3S-Smart Software Solutions CODESYS Control. An attacker could exploit the vulnerability with a specially crafted request to cause a denial of service. The following products and versions are affected: CODESYS Control for BeagleBone version before 3.5.15.0, CODESYS Control for emPC-A / iMX6 version before 3.5.15.0, CODESYS Control for IOT2000 version before 3.5.15.0, CODESYS Control for Linux version before 3.5.15.0 , Before CODESYS Control for PFC100 3.5.15.0, before CODESYS Control for PFC200 3.5.15.0, before CODESYS Control for Raspberry Pi 3.5.15.0, before CODESYS Control RTE V3 3.5.15.0, before CODESYS Control RTE V3 3.5.15.0 Version (for Beckhoff CX), CODESYS Control Win V3 before 3.5.15.0 (part of CODESYS Development System setup), CODESYS Control V3 Runtime System Toolkit before 3.5.15.0, CODESYS V3 Safety SIL2 before 3.5.15.0, CODESYS Gateway V3 Version before 3.5.15.0, CODESYS HMI V3 version before 3.5.15.0, CODESYS V3 Simulation Runtime version before 3.5.15.0 (part of CODESYS Development System)
VAR-201909-0641 CVE-2019-16288 Tenda N301 Wireless router input validation vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
On Tenda N301 wireless routers, a long string in the wifiSSID parameter of a goform/setWifi POST request causes the device to crash. Tenda N301 Wireless routers contain a vulnerability related to input validation.Service operation interruption (DoS) There is a possibility of being put into a state. Tenda N301 is a wireless router from China Tenda. There is an input validation error vulnerability in Tenda N301
VAR-201910-0254 CVE-2019-3421 ZTE ZX297520V3 Vulnerability in injection CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
The 7520V3V1.0.0B09P27 version, and all earlier versions of ZTE product ZX297520V3 are impacted by a Command Injection vulnerability. Unauthorized users can exploit this vulnerability to control the user terminal system. ZTE ZX297520V3 Contains an injection vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. ZTE Microelectronics is committed to providing overall solutions for 3G / 4G terminals, providing products such as baseband processors, radio frequency, application processors, and power chips. A remote command execution vulnerability exists in a process of ZTE's 4G baseband system. An attacker can remotely trigger the vulnerability in various ways to obtain root permissions of the baseband operating system
VAR-201909-1000 CVE-2019-13542 3S-Smart Software Solutions CODESYS Control Code Issue Vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition. 3S-Smart Software Solutions CODESYS Control is a set of industrial control program programming software from Germany 3S-Smart Software Solutions. A code issue vulnerability exists in 3S-Smart Software Solutions CODESYS Control. The vulnerability originates from improper design or implementation during code development of a network system or product. The following products and versions are affected: CODESYS Control for BeagleBone 3.5.11.0 to 3.5.15.0, CODESYS Control for emPC-A / iMX6 3.5.11.0 to 3.5.15.0, and CODESYS Control for IOT2000 3.5.11.0 to 3.5. Version 15.0, CODESYS Control for Linux 3.5.11.0 to 3.5.15.0, CODESYS Control for PFC100 3.5.11.0 to 3.5.15.0, CODESYS Control for PFC200 3.5.11.0 to 3.5.15.0, CODESYS Control for Raspberry Pi Version 3.5.11.0 to 3.5.15.0, CODESYS Control RTE V3 3.5.11.0 to 3.5.15.0, CODESYS Control RTE V3 3.5.11.0 to 3.5.15.0 (for Beckhoff CX), CODESYS Control Win V3 3.5.11.0 Version to 3.5.15.0 (also part of CODESYS Development System setup), CODESYS Control V3 Runtime System Toolkit version 3.5.11.0 to 3.5.15.0
VAR-201909-0996 CVE-2019-13532 3S-Smart Software Solutions CODESYS V3 web server Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller. CODESYS V3 web The server contains a path traversal vulnerability.Information may be obtained
VAR-201909-1519 CVE-2019-13548 3S-Smart Software Solutions CODESYS V3 web server Buffer Overflow Vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which could cause a stack overflow and create a denial-of-service condition or allow remote code execution. CODESYS V3 web The server contains an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. 3S-Smart Software Solutions CODESYS V3 web server is a web server used by 3S-Smart Software Solutions of Germany in CODESYS products. 3S-Smart Software Solutions CODESYS V3 web server A buffer overflow vulnerability exists in versions prior to 3.5.14.10
VAR-201909-0998 CVE-2019-13538 3S-Smart Software Solutions CODESYS Development System Cross-Site Scripting Vulnerability CVSS V2: 6.8
CVSS V3: 8.6
Severity: HIGH
3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0, allows the system to display active library content without checking its validity, which may allow the contents of manipulated libraries to be displayed or executed. The issue also exists for source libraries, but 3S-Smart Software Solutions GmbH strongly recommends distributing compiled libraries only. 3S-Smart Software Solutions The CODESYS Development System is a set of programming tools for industrial controllers and automation technology from 3S-Smart Software Solutions, Germany
VAR-201909-0997 CVE-2019-13534 Philips IntelliVue WLAN portable patient Vulnerabilities related to incompleteness verification of downloaded code in Monitor CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
Philips IntelliVue WLAN, portable patient monitors, WLAN Version A, Firmware A.03.09, WLAN Version A, Firmware A.03.09, Part #: M8096-67501, WLAN Version B, Firmware A.01.09, Part #: N/A (Replaced by Version C) and WLAN Version B, Firmware A.01.09, Part #: N/A (Replaced by Version C). The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code. Philips IntelliVue WLAN portable patient The monitor contains a vulnerability related to the integrity verification of downloaded code.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Philips IntelliVue MP monitors MP20-MP90 are all portable patient vital sign monitors from Philips in Europe. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements