VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202412-2528 CVE-2024-12175 Rockwell Automation  of  Arena  Vulnerability in using free memory in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. (DoS) It may be in a state. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Rockwell Automation Arena Simulation is a set of simulation software from Rockwell Automation, an American company, that provides 3D animation and graphics functions
VAR-202412-2454 CVE-2024-12371 Rockwell Automation Power Monitor 1000 Device Takeover Vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: Critical
A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset. Rockwell Automation Power Monitor 1000 versions prior to 4.020 have a security vulnerability that can be exploited by attackers to configure new policy holder users without any authentication through the API
VAR-202412-2453 CVE-2023-34990 fortinet's  FortiWLM  relative path traversal vulnerability in CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests. fortinet's FortiWLM contains a relative path traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiWLM is a wireless manager of Fortinet, an American company. Fortinet FortiWLM has a path traversal vulnerability, which is caused by the program failing to properly filter special elements in resource or file paths
VAR-202412-0615 CVE-2024-37607 D-Link Systems, Inc.  of  DAP-2555  Classic buffer overflow vulnerability in firmware CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
A Buffer overflow vulnerability in D-Link DAP-2555 REVA_FIRMWARE_1.20 allows remote attackers to cause a Denial of Service (DoS) via a crafted HTTP request. D-Link Systems, Inc. of DAP-2555 Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. D-Link DAP-2555 is a wireless access point of D-Link, a Chinese company. D-Link DAP-2555 REVA_FIRMWARE_1.20 version has a denial of service vulnerability, which is caused by null pointer dereference
VAR-202412-0587 CVE-2024-37606 D-Link Systems, Inc.  of  DCS-932L  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 6.5
Severity: MEDIUM
A Stack overflow vulnerability in D-Link DCS-932L REVB_FIRMWARE_2.18.01 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request. D-Link Systems, Inc. of DCS-932L Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. D-Link DCS-932L is a network surveillance camera from D-Link, a Chinese company. It is used for security and monitoring. D-Link DCS-932L REVB_FIRMWARE_2.18.01 version has a denial of service vulnerability, which is caused by null pointer dereference
VAR-202412-0606 CVE-2024-37605 D-Link Systems, Inc.  of  DIR-860L  in the firmware  NULL  Pointer dereference vulnerability CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
A NULL pointer dereference in D-Link DIR-860L REVB_FIRMWARE_2.04.B04_ic5b allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request. D-Link Systems, Inc. of DIR-860L The firmware has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. D-Link DIR-860L is a wireless router from D-Link, a Chinese company. An attacker can exploit this vulnerability to cause a denial of service
VAR-202412-0623 CVE-2024-36832 D-Link Systems, Inc.  of  DAP-1513  in the firmware  NULL  Pointer dereference vulnerability CVSS V2: 7.6
CVSS V3: 7.5
Severity: HIGH
A NULL pointer dereference in D-Link DAP-1513 REVA_FIRMWARE_1.01 allows attackers to cause a Denial of Service (DoS) via a crafted web request without authentication. The vulnerability occurs in the /bin/webs binary of the firmware. When /bin/webs receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference, leading to a denial of service attack to the device. D-Link Systems, Inc. of DAP-1513 The firmware has NULL There is a vulnerability in pointer dereference.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DAP-1513 is a wireless bridge produced by D-Link of China. Attackers can exploit this vulnerability to cause a denial of service
VAR-202412-0630 CVE-2024-36831 D-Link Systems, Inc.  of  D-Link DAP-1520  in the firmware  NULL  Pointer dereference vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A NULL pointer dereference in the plugins_call_handle_uri_clean function of D-Link DAP-1520 REVA_FIRMWARE_1.10B04_BETA02_HOTFIX allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request without authentication. D-Link Systems, Inc. of D-Link DAP-1520 The firmware has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. D-Link DAP-1520 is a wireless access point product of D-Link, a Chinese company. Attackers can exploit this vulnerability to cause a denial of service
VAR-202412-3430 No CVE Taiwan Sharp Corporation SHARP-MX-2630N has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
SHARP-MX-2630N is a multi-function color digital MFP. SHARP-MX-2630N of Taiwan Sharp Corporation has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202412-3428 No CVE Epson (China) Co., Ltd. L15160 Series has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The L15160 Series is a multi-function printer designed for small and medium-sized office groups. Epson (China) Co., Ltd. L15160 Series has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202412-3429 No CVE Samsung (China) Investment Co., Ltd. C145x-Series has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Samsung (China) Investment Co., Ltd. is an enterprise mainly engaged in business services. Samsung (China) Investment Co., Ltd. C145x-Series has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202412-0834 No CVE Siemens SIMATIC PCS neo Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
SIMATIC PCS neo is a fully web-based process control system. Siemens SIMATIC PCS neo has a buffer overflow vulnerability that can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-0653 No CVE Siemens Opcenter Execution Foundation Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
Opcenter Execution Foundation is a manufacturing execution system (MES) software launched by Siemens, which is mainly used to monitor and synchronize the manufacturing activities of all factories around the world. The software implements low-code personalization through embedded Mendix technology, allowing users to customize and develop systems suitable for specific production scenarios according to their own needs. Siemens Opcenter Execution Foundation has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-3346 No CVE Siemens Opcenter RDL Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
The Opcenter Research Development & Laboratory (RD&L) series of software products can simplify, optimize and adjust the formulation product development, improve the innovation efficiency of fast-moving consumer goods, and optimize the data management of fast-moving consumer goods. Siemens Opcenter RDL has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-3345 No CVE Siemens ‌Opcenter Quality‌ Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
Opcenter Quality‌ is a closed-loop quality management system (QMS) product series launched by Siemens, which aims to ensure that products meet requirements and promote continuous improvement, thereby providing high-quality products‌. Siemens ‌Opcenter Quality‌ has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-2941 No CVE Siemens Opcenter Intelligence Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
Opcenter Intelligence‌ is a manufacturing intelligence solution launched by Siemens, which aims to improve the efficiency and quality of the manufacturing process through big data analysis. The solution provides a variety of products and services to meet the needs of different users. Siemens Opcenter Intelligence has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-3098 No CVE Siemens SINEC NMS Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
SINEC NMS is a network management system (NMS) that can scale to handle network structures of all sizes in an increasingly digital world. The system can be used to centrally monitor, manage and configure industrial networks covering tens of thousands of devices around the clock, including safety-related areas. A buffer overflow vulnerability exists in Siemens SINEC NMS that can be exploited by an unauthenticated remote attacker to execute arbitrary code.
VAR-202412-3099 No CVE Siemens Totally Integrated Automation Portal (TIA Portal) Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
Totally Integrated Automation Portal (TIA Portal) is an integrated automation platform that provides a full range of digital automation services from digital planning to integrated engineering and transparent operation. TIA Portal is designed to shorten time to market, improve factory production efficiency, and increase system flexibility. It includes innovative simulation tools, seamlessly integrated engineering functions, and transparent operation management, and is particularly suitable for system integrators, machine manufacturers, and factory operators. Siemens Totally Integrated Automation Portal (TIA Portal) has a buffer overflow vulnerability that can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-2239 CVE-2024-47238 Vulnerabilities in multiple Dell products CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution. Embedded Box PC 3000 firmware, Dell Edge Gateway 3001 firmware, Dell Edge Gateway 3002 Unspecified vulnerabilities exist in multiple Dell products, including firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202412-1095 CVE-2024-46341 TP-LINK Technologies  of  TL-WR845N  Insufficient Credential Protection Vulnerability in Firmware CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
TP-Link TL-WR845N(UN)_V4_190219 was discovered to transmit credentials in base64 encoded form, which can be easily decoded by an attacker executing a man-in-the-middle attack. TP-LINK Technologies of TL-WR845N A firmware vulnerability related to insufficient protection of credentials exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK WR845N is a wireless router from China's TP-LINK company