VARIoT IoT vulnerabilities database
| VAR-202503-2006 | CVE-2025-24070 | Microsoft's ASP.NET Core and Microsoft Visual Studio Elevated Privileges in |
CVSS V2: - CVSS V3: 7.0 Severity: HIGH |
Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network
| VAR-202503-0792 | CVE-2024-54026 |
CVSS V2: - CVSS V3: 4.3 Severity: MEDIUM |
An improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiSandbox 4.4.0 through 4.4.6, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all versions, FortiSandbox Cloud 24.1 allows attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
| VAR-202503-2484 | CVE-2024-54018 | fortinet's FortiSandbox In OS Command injection vulnerability |
CVSS V2: - CVSS V3: 7.2 Severity: HIGH |
Multiple improper neutralization of special elements used in an OS Command vulnerabilities [CWE-78] in FortiSandbox before 4.4.5 allows a privileged attacker to execute unauthorized commands via crafted requests. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202503-1498 | CVE-2024-52961 | fortinet's FortiSandbox In OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] vulnerability in Fortinet FortiSandbox 5.0.0, FortiSandbox 4.4.0 through 4.4.6, FortiSandbox 4.2.1 through 4.2.7, FortiSandbox 4.0.0 through 4.0.5, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all versions allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests. fortinet's FortiSandbox for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiSandbox is an APT (Advanced Persistent Threat) protection device from Fortinet Systems, Inc. It offers dual sandbox technology, a dynamic threat intelligence system, a real-time control panel, and reporting capabilities.
The Fortinet FortiSandbox contains an operating system command injection vulnerability
| VAR-202503-1155 | CVE-2024-52960 |
CVSS V2: - CVSS V3: 4.3 Severity: MEDIUM |
A client-side enforcement of server-side security vulnerability [CWE-602] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.6 and before 4.2.7 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.
| VAR-202503-0802 | CVE-2024-45328 |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
An incorrect authorization vulnerability [CWE-863] in FortiSandbox 4.4.0 through 4.4.6 may allow a low priviledged administrator to execute elevated CLI commands via the GUI console menu.
| VAR-202503-0284 | CVE-2025-27438 | Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.
This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202503-0301 | CVE-2025-27396 | Siemens' SCALANCE LPE9403 Vulnerability due to improper checks for deleted privileges in firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly limit the elevation of privileges required to perform certain valid functionality.
This could allow an authenticated lowly-privileged remote attacker to escalate their privileges. Siemens' SCALANCE LPE9403 The firmware contains a vulnerability related to improper checking of deleted privileges.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing of Siemens, Germany. It is used to capture, collect and pre-process industrial field data.
Siemens SCALANCE LPE9403 has a privilege escalation vulnerability. Attackers can exploit this vulnerability to elevate privileges
| VAR-202503-0298 | CVE-2025-27395 | Siemens' SCALANCE LPE9403 Path traversal vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly limit the scope of files accessible through and the privileges of the SFTP functionality.
This could allow an authenticated highly-privileged remote attacker to read and write arbitrary files. Siemens' SCALANCE LPE9403 A path traversal vulnerability exists in firmware.Information may be obtained and information may be tampered with. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing from Siemens, Germany. It is used to capture, collect and pre-process industrial field data
| VAR-202503-0300 | CVE-2025-27394 | Siemens' SCALANCE LPE9403 in the firmware OS Command injection vulnerability |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly sanitize user input when creating new SNMP users.
This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device. Siemens' SCALANCE LPE9403 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing from Siemens, Germany. It is used to capture, collect and pre-process industrial field data.
SCALANCE LPE9403 (6GK5998-3GS00-2AC2) has an operating system command injection vulnerability
| VAR-202503-0299 | CVE-2025-27393 | Siemens' SCALANCE LPE9403 in the firmware OS Command injection vulnerability |
CVSS V2: 8.3 CVSS V3: 7.2 Severity: High |
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly sanitize user input when creating new users.
This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device. Siemens' SCALANCE LPE9403 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SCALANCE LPE9403 is a local processing engine for industrial field data processing from Siemens, Germany. It is used to capture, collect and pre-process industrial field data
| VAR-202503-0305 | CVE-2025-25267 | Siemens' Tecnomatix Plant Simulation Vulnerability in externally accessible files or directories in |
CVSS V2: - CVSS V3: 6.2 Severity: Medium |
A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application does not properly restrict the scope of files accessible to the simulation model. This could allow an unauthorized attacker to compromise the confidentiality of the system
| VAR-202503-0304 | CVE-2025-25266 | Siemens' Tecnomatix Plant Simulation Vulnerability in externally accessible files or directories in |
CVSS V2: - CVSS V3: 6.8 Severity: High |
A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application does not properly restrict access to the file deletion functionality.
This could allow an unauthorized attacker to delete files even when access to the system should be prohibited, resulting in potential data loss or unauthorized modification of system files. Siemens' Tecnomatix Plant Simulation Exists in a vulnerability in externally accessible files or directories.Information is tampered with and service operation is interrupted (DoS) It may be in a state
| VAR-202503-0279 | CVE-2025-23402 | Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Vulnerability in using free memory in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files.
An attacker could leverage this vulnerability to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume, thereby improving manufacturing system performance
| VAR-202503-0277 | CVE-2025-23401 | Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.
This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202503-0283 | CVE-2025-23400 | Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Buffer error vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume, thereby improving the performance of manufacturing systems
| VAR-202503-0280 | CVE-2025-23399 | Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.
This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202503-0278 | CVE-2025-23398 | Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Buffer error vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the functions of discrete event simulation to analyze and optimize production volume, thereby improving the performance of manufacturing systems
| VAR-202503-0281 | CVE-2025-23397 | Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Buffer error vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume, thereby improving manufacturing system performance
| VAR-202503-0282 | CVE-2025-23396 | Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.
This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state