VARIoT IoT vulnerabilities database
| VAR-201902-0647 | CVE-2018-18988 | LAquis SCADA Input validation vulnerability |
CVSS V2: 7.5 CVSS V3: 8.8 Severity: HIGH |
LCDS Laquis SCADA prior to version 4.1.0.4150 allows execution of script code by opening a specially crafted report format file. This may allow remote code execution, data exfiltration, or cause a system crash. Script embedded in a crafted file can create files in arbitrary locations using the Ini.WriteNumber method. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of the MemoryWriteLong method. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the aq process. LAquis SCADA is a suite of SCADA software for monitoring and data acquisition. LCDS LAquis SCADA is prone to multiple security vulnerabilities. Failed attempts will likely cause a denial-of-service condition.
LCDS LAquis SCADA version 4.1.0.3870 is vulnerable; other versions may also be affected
| VAR-201902-0651 | CVE-2018-18998 | LCDS Laquis SCADA Vulnerabilities related to the use of hard-coded credentials |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
LCDS Laquis SCADA prior to version 4.1.0.4150 uses hard coded credentials, which may allow an attacker unauthorized access to the system with high privileges. LCDS Laquis SCADA Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to bypass authentication on vulnerable installations of LAquis SCADA Software. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of login requests to the product's webserver. The product contains a hard-coded password for a number of undocumented accounts. An attacker can leverage this vulnerability to bypass authentication on the system. LCDS LAquis SCADA is a SCADA (Data Acquisition and Monitoring Control) system from LCDS, Brazil. The system is mainly used for data acquisition and process control of devices with communication technology. A security vulnerability exists in the LCDS LAquis SCADA version 4.1.0.3870, which stems from the fact that the program uses hard-coded credentials. LCDS LAquis SCADA is prone to multiple security vulnerabilities.
An attacker may leverage these issues to execute arbitrary code, perform unauthorized actions or gain access to sensitive information that may aid in further attacks. Failed attempts will likely cause a denial-of-service condition.
LCDS LAquis SCADA version 4.1.0.3870 is vulnerable; other versions may also be affected
| VAR-201902-0639 | CVE-2018-19000 | LCDS LAquis SCADA Authentication Bypass Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
LCDS Laquis SCADA prior to version 4.1.0.4150 allows an authentication bypass, which may allow an attacker access to sensitive data. LCDS Laquis SCADA Contains an authentication vulnerability.Information may be obtained. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of URIs by the product's web server. A crafted URI can cause the web service to bypass authentication that should be required for the web page. An attacker can leverage this vulnerability to access system information. LCDS LAquis SCADA is a SCADA (Data Acquisition and Monitoring Control) system from LCDS, Brazil. The system is mainly used for data acquisition and process control of devices with communication technology. LCDS LAquis SCADA is prone to multiple security vulnerabilities.
An attacker may leverage these issues to execute arbitrary code, perform unauthorized actions or gain access to sensitive information that may aid in further attacks. Failed attempts will likely cause a denial-of-service condition.
LCDS LAquis SCADA version 4.1.0.3870 is vulnerable; other versions may also be affected
| VAR-201902-0645 | CVE-2018-19029 | LCDS Laquis SCADA In NULL Pointer dereference vulnerability |
CVSS V2: 8.3 CVSS V3: 7.8 Severity: HIGH |
LCDS Laquis SCADA prior to version 4.1.0.4150 allows an attacker using a specially crafted project file to supply a pointer for a controlled memory address, which may allow remote code execution, data exfiltration, or cause a system crash. LCDS Laquis SCADA Is NULL A vulnerability related to pointer dereference exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of LQS files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the process. LCDS LAquis SCADA is a SCADA (Data Acquisition and Monitoring Control) system from LCDS, Brazil. The system is mainly used for data acquisition and process control of devices with communication technology. A security vulnerability exists in the LCDS LAquis SCADA version 4.1.0.3870. Failed attempts will likely cause a denial-of-service condition.
LCDS LAquis SCADA version 4.1.0.3870 is vulnerable; other versions may also be affected
| VAR-201901-0234 | CVE-2019-2399 | Oracle Communications Applications of Oracle Communications Diameter Signaling Router In Security Vulnerabilities |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) component of Oracle Communications Applications (subcomponent: Security). The supported version that is affected is prior to 8.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Diameter Signaling Router (DSR) accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Diameter Signaling Router (DSR). CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).
The vulnerability can be exploited over the 'HTTP' protocol. The 'Security' component is affected. Attackers can use this vulnerability to read data without authorization, causing denial of service and affecting data confidentiality and availability
| VAR-201901-1700 | No CVE | Maple Switch Has Weak Password Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Maipu switches generally have weak passwords. After entering, they can perform arbitrary operations by low-privileged users.
This is based on http basic authentication
http://111.50.98.155:80
http://111.50.98.151:80
http://111.50.98.154:80
admin / admin
| VAR-201901-1696 | No CVE | Ruijie RG-AC128 has remote command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Ruijie RG-AC128 is a new generation of wireless controller for high-speed wireless network launched by Ruijie Networks.
Ruijie RG-AC128 has a remote command execution vulnerability. An attacker could use this vulnerability to execute a command.
| VAR-201901-1515 | CVE-2018-20720 | ABB Relion 630 Vulnerability related to input validation on devices |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
ABB Relion 630 devices 1.1 before 1.1.0.C0, 1.2 before 1.2.0.B3, and 1.3 before 1.3.0.A6 allow remote attackers to cause a denial of service (reboot) via a reboot command in an SPA message. ABB Relion 630 The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. ABB Relion 630 is a relay device used for substation automation protection and control from ABB in Switzerland.
ABB Relion 630 has security vulnerabilities in version 1.1 before 1.1.0.C0, version 1.2 before 1.2.0.B3, and version 1.3 before 1.3.0.A6. ABB Relion 630 is prone to a denial-of-service vulnerability.
Successful exploits of this issue may allow an attacker to crash the affected device, denying service to legitimate users.
The following versions of ABB Relion 630 series are vulnerable:
ABB Relion 630 series prior to 1.1.0.C0
ABB Relion 630 series prior to 1.2.0.B3
ABB Relion 630 series prior to 1.3.0.A6
| VAR-201903-1176 | CVE-2018-18994 | LCDS Laquis SCADA Vulnerable to out-of-bounds reading |
CVSS V2: 7.8 CVSS V3: 7.1 Severity: HIGH |
LCDS Laquis SCADA prior to version 4.1.0.4150 allows an out of bounds read when opening a specially crafted project file, which may cause a system crash or allow data exfiltration. LCDS Laquis SCADA Contains an out-of-bounds vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the process. LCDS LAquis SCADA is a SCADA (Data Acquisition and Monitoring Control) system from LCDS, Brazil. The system is mainly used for data acquisition and process control of devices with communication technology. LCDS LAquis SCADA is prone to multiple security vulnerabilities. Failed attempts will likely cause a denial-of-service condition.
LCDS LAquis SCADA version 4.1.0.3870 is vulnerable; other versions may also be affected
| VAR-201902-0640 | CVE-2018-19002 | LCDS LAquis SCADA Code injection vulnerability |
CVSS V2: 8.3 CVSS V3: 7.8 Severity: HIGH |
LCDS Laquis SCADA prior to version 4.1.0.4150 allows improper control of generation of code when opening a specially crafted project file, which may allow remote code execution, data exfiltration, or cause a system crash. LCDS Laquis SCADA Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in a controlled call to VirtualProtect. An attacker can leverage this vulnerability to execute code in the context of the aq process. LCDS LAquis SCADA is a SCADA (Data Acquisition and Monitoring Control) system from LCDS, Brazil. The system is mainly used for data acquisition and process control of devices with communication technology. LCDS LAquis SCADA is prone to multiple security vulnerabilities.
An attacker may leverage these issues to execute arbitrary code, perform unauthorized actions or gain access to sensitive information that may aid in further attacks. Failed attempts will likely cause a denial-of-service condition.
LCDS LAquis SCADA version 4.1.0.3870 is vulnerable; other versions may also be affected
| VAR-201902-0648 | CVE-2018-18990 | LCDS LAquis SCADA Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
LCDS Laquis SCADA prior to version 4.1.0.4150 allows a user-supplied path in file operations prior to proper validation. An attacker can leverage this vulnerability to disclose sensitive information under the context of the web server process. LCDS Laquis SCADA Contains a path traversal vulnerability.Information may be obtained. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of requested URLs. LCDS LAquis SCADA is a SCADA (Data Acquisition and Monitoring Control) system from LCDS, Brazil. The system is mainly used for data acquisition and process control of devices with communication technology. The vulnerability stems from the fact that the program failed to validate correctly before using the user-submitted path. information. LCDS LAquis SCADA is prone to multiple security vulnerabilities.
An attacker may leverage these issues to execute arbitrary code, perform unauthorized actions or gain access to sensitive information that may aid in further attacks. Failed attempts will likely cause a denial-of-service condition.
LCDS LAquis SCADA version 4.1.0.3870 is vulnerable; other versions may also be affected
| VAR-201902-0646 | CVE-2018-18986 | LCDS Laquis SCADA Vulnerable to out-of-bounds reading |
CVSS V2: 8.3 CVSS V3: 7.8 Severity: HIGH |
LCDS Laquis SCADA prior to version 4.1.0.4150 allows the opening of a specially crafted report format file that may cause an out of bounds read, which may cause a system crash, allow data exfiltration, or remote code execution. LCDS Laquis SCADA Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of LGX files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the process. LCDS LAquis SCADA is a SCADA (Data Acquisition and Monitoring Control) system from LCDS, Brazil. The system is mainly used for data acquisition and process control of devices with communication technology. LCDS LAquis SCADA is prone to multiple security vulnerabilities. Failed attempts will likely cause a denial-of-service condition.
LCDS LAquis SCADA version 4.1.0.3870 is vulnerable; other versions may also be affected
| VAR-201902-0649 | CVE-2018-18992 | LCDS LAquis SCADA Injection Vulnerability |
CVSS V2: 7.5 CVSS V3: 8.8 Severity: HIGH |
LCDS Laquis SCADA prior to version 4.1.0.4150 allows taking in user input without proper sanitation, which may allow an attacker to execute remote code on the server. LCDS Laquis SCADA Contains an injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of calls to relatorioindividual.lhtml. When parsing the TAG Element, the process does not properly sanitize user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of the aq process. LCDS LAquis SCADA is a SCADA (Data Acquisition and Monitoring Control) system from LCDS, Brazil. The system is mainly used for data acquisition and process control of devices with communication technology. A security vulnerability exists in the LCDS LAquis SCADA version 4.1.0.3870, which was caused by a user receiving a user input without properly filtering it. LCDS LAquis SCADA is prone to multiple security vulnerabilities.
An attacker may leverage these issues to execute arbitrary code, perform unauthorized actions or gain access to sensitive information that may aid in further attacks. Failed attempts will likely cause a denial-of-service condition.
LCDS LAquis SCADA version 4.1.0.3870 is vulnerable; other versions may also be affected
| VAR-201902-0641 | CVE-2018-19004 | LAquis SCADA LQS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability |
CVSS V2: 4.3 CVSS V3: 3.3 Severity: LOW |
LCDS Laquis SCADA prior to version 4.1.0.4150 allows out of bounds read when opening a specially crafted project file, which may allow data exfiltration. LCDS Laquis SCADA Contains an out-of-bounds vulnerability.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the aq process. LCDS LAquis SCADA is a SCADA (Data Acquisition and Monitoring Control) system from LCDS, Brazil. The system is mainly used for data acquisition and process control of devices with communication technology. LCDS LAquis SCADA is prone to multiple security vulnerabilities.
An attacker may leverage these issues to execute arbitrary code, perform unauthorized actions or gain access to sensitive information that may aid in further attacks. Failed attempts will likely cause a denial-of-service condition.
LCDS LAquis SCADA version 4.1.0.3870 is vulnerable; other versions may also be affected
| VAR-201903-1014 | CVE-2018-10091 | AudioCodes 400HD Cross-Site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow XSS. A cross-site scripting vulnerability exists in AudioCodes400HD that can be exploited by remote attackers to execute JavaScript code in a user's browser
| VAR-201903-1015 | CVE-2018-10093 | AudioCodes 400HD Command Injection Vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow Remote Code Execution. AudioCodes IP phone 420HD The device firmware contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AudioCodes400HD is a 400HD series IP phone product from Israel AudioCodes. There is a command injection vulnerability in AudioCodes400HD that stems from a program failing to properly filter user input, which an attacker can use to inject arbitrary commands and control devices
| VAR-201901-0846 | CVE-2018-16098 | plural Lenovo ThinkPad Product Synaptics Pointing Vulnerabilities related to unquoted search paths or elements in devices |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
In some Lenovo ThinkPads, an unquoted search path vulnerability was found in various versions of the Synaptics Pointing Device driver which could allow unauthorized code execution as a low privilege user. plural Lenovo ThinkPad Product Synaptics Pointing The device contains a vulnerability with unquoted search paths or elements.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Lenovo ThinkPad Helix 20CG and others are notebook computer products of China Lenovo (Lenovo). Synaptics Pointing Device is one of the joystick and touchpad drivers. A security vulnerability exists in the Synaptics Pointing Device driver in several Lenovo products. An attacker could exploit this vulnerability to execute code. The following products are affected: Lenovo ThinkPad Helix 20CG; ThinkPad Helix 20CH; ThinkPad Helix (3xxx); ThinkPad L430/L530; ThinkPad P50 20EN; ThinkPad P50 20EQ;
| VAR-201901-0269 | CVE-2019-3906 | Premisys Identicard Vulnerabilities related to the use of hard-coded credentials |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents. Premisys Identicard Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. IDenticard Premisys is a set of access control systems from IDenticard Systems, USA. The system allows the system to grant and restrict access to doors, lock down facilities, view integrated reports, create detailed reports, and more.
There are security vulnerabilities in IDenticard Systems version 3.1.190. A weak-encryption security weakness
Attackers may exploit these issues to gain unauthorized access to the affected application, or to bypass certain security restrictions to perform unauthorized actions, and view encrypted data and obtain sensitive information.
Premisys 3.1.190 is vulnerable; other versions may also be affected
| VAR-201901-0270 | CVE-2019-3908 | Premisys Identicard Vulnerabilities related to the use of hard-coded credentials |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data. Premisys Identicard Contains a vulnerability in the use of hard-coded credentials.Information may be obtained. IDenticard Premisys is a set of access control systems from IDenticard Systems, USA. The system allows the system to grant and restrict access to doors, lock down facilities, view integrated reports, create detailed reports, and more.
There are security vulnerabilities in IDenticard Systems version 3.1.190. A weak-encryption security weakness
Attackers may exploit these issues to gain unauthorized access to the affected application, or to bypass certain security restrictions to perform unauthorized actions, and view encrypted data and obtain sensitive information.
Premisys 3.1.190 is vulnerable; other versions may also be affected
| VAR-201902-0594 | CVE-2018-1666 | IBM DataPower Gateway Injection vulnerability |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
IBM DataPower Gateway 2018.4.1.0, 7.6.0.0 through 7.6.0.11, 7.5.2.0 through 7.5.2.18, 7.5.1.0 through 7.5.1.18, 7.5.0.0 through 7.5.0.19, and 7.7.0.0 through 7.7.1.3 could allow an authenticated user to inject arbitrary messages that would be displayed on the UI. IBM X-Force ID: 144892. IBM DataPower Gateway Contains an injection vulnerability. Vendors have confirmed this vulnerability IBM X-Force ID: 144892 It is released as.Information may be tampered with.
Attackers can exploit this issue to bypass security restrictions to perform unauthorized actions; this may aid in launching further attacks. IBM DataPower Gateway is a security and integration platform specially designed for mobile, cloud, application programming interface (API), network, service-oriented architecture (SOA), B2B and cloud workloads. The platform secures, integrates and optimizes access across channels with a dedicated gateway platform. An attacker can exploit this vulnerability to inject arbitrary messages. The following versions are affected: IBM DataPower Gateway 2018.4.1.0, 7.6.0.0 to 7.6.0.11, 7.5.2.0 to 7.5.2.18, 7.5.1.0 to 7.5.1.18, 7.5.0.0 to 7.5.0.19 Version, version 7.7.0.0 to version 7.7.1.3