VARIoT IoT vulnerabilities database
| VAR-202406-1456 | CVE-2024-36650 | TOTOLINK of A3100R Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
TOTOLINK AC1200 Wireless Dual Band Gigabit Router firmware A3100R V4.1.2cu.5247_B20211129, in the cgi function `setNoticeCfg` of the file `/lib/cste_modules/system.so`, the length of the user input string `NoticeUrl` is not checked. This can lead to a buffer overflow, allowing attackers to construct malicious HTTP or MQTT requests to cause a denial-of-service attack. TOTOLINK of A3100R Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. TOTOLINK AC1200 is a dual-band Wi-Fi router from China's TOTOLINK Electronics
| VAR-202406-0212 | CVE-2024-35303 | Siemens Tecnomatix Plant Simulation MODEL File Parsing Type Confusion Remote Code Execution Vulnerability |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0012), Tecnomatix Plant Simulation V2404 (All versions < V2404.0001). The affected applications contain a type confusion vulnerability while parsing specially crafted MODEL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-22958). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of MODEL files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition
| VAR-202406-0059 | CVE-2024-35292 | Siemens S7-200 SMART series uses insecure random values vulnerability |
CVSS V2: 8.5 CVSS V3: 8.2 Severity: HIGH |
A vulnerability has been identified in SIMATIC S7-200 SMART CPU CR40 (6ES7288-1CR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU CR60 (6ES7288-1CR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR30 (6ES7288-1SR30-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR30 (6ES7288-1SR30-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR40 (6ES7288-1SR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR40 (6ES7288-1SR40-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR60 (6ES7288-1SR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR60 (6ES7288-1SR60-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST20 (6ES7288-1ST20-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST20 (6ES7288-1ST20-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST30 (6ES7288-1ST30-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST30 (6ES7288-1ST30-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST40 (6ES7288-1ST40-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST40 (6ES7288-1ST40-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST60 (6ES7288-1ST60-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST60 (6ES7288-1ST60-0AA1) (All versions). Affected devices are using a predictable IP ID sequence number. This leaves the system susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack and eventually could allow an attacker to create a denial of service condition. The S7-200 SMART series is a series of micro programmable logic controllers that can control a variety of small automation applications.
The Siemens S7-200 SMART series has an unsafe random value vulnerability that can be exploited by attackers to create a denial of service condition
| VAR-202406-0064 | CVE-2024-35212 | Siemens' sinec traffic analyzer Vulnerability in |
CVSS V2: 7.8 CVSS V3: 6.2 Severity: Medium |
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected application lacks input validation due to which an attacker can gain access to the Database entries. Siemens' sinec traffic analyzer Exists in unspecified vulnerabilities.Information may be obtained. SINEC Traffic Analyzer is an on-premises application that monitors PNIO (PROFINET IO) communication between controllers and IO devices. The software detects PROFINET communication problems and reports them to the user via the Web-UI
| VAR-202406-0062 | CVE-2024-35211 | Siemens' sinec traffic analyzer In HTTPS within the session Secure Important with no attributes Cookie Vulnerability |
CVSS V2: 6.8 CVSS V3: 5.5 Severity: Medium |
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server, after a successful login, sets the session cookie on the browser, without applying any security attributes (such as “Secure”, “HttpOnly”, or “SameSite”). Siemens' sinec traffic analyzer for, HTTPS within the session Secure Important with no attributes Cookie There is a vulnerability related to.Information may be obtained. SINEC Traffic Analyzer is an on-premises application that monitors PNIO (PROFINET IO) communication between controllers and IO devices. The software detects PROFINET communication problems and reports them to the user via the Web-UI
| VAR-202406-0065 | CVE-2024-35210 | Siemens' sinec traffic analyzer Vulnerability in plaintext transmission of important information in |
CVSS V2: 6.4 CVSS V3: 5.1 Severity: Medium |
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server is not enforcing HSTS. This could allow an attacker to perform downgrade attacks exposing confidential information. SINEC Traffic Analyzer is an on-premises application that monitors PNIO (PROFINET IO) communication between controllers and IO devices. The software detects PROFINET communication problems and reports them to the user via the Web-UI
| VAR-202406-0063 | CVE-2024-35209 | Siemens' sinec traffic analyzer Vulnerabilities related to exposing dangerous methods and functions in |
CVSS V2: 7.8 CVSS V3: 6.2 Severity: Medium |
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server is allowing HTTP methods like PUT and Delete. This could allow an attacker to modify unauthorized files. SINEC Traffic Analyzer is an on-premises application that monitors PNIO (PROFINET IO) communication between controllers and IO devices. The software detects PROFINET communication problems and reports them to the user via the Web-UI
| VAR-202406-0066 | CVE-2024-35208 | Siemens' sinec traffic analyzer Vulnerability regarding insufficient protection of authentication information in |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server stored the password in cleartext. This could allow attacker in a privileged position to obtain access passwords. SINEC Traffic Analyzer is an on-premises application that monitors PNIO (PROFINET IO) communication between controllers and IO devices. The software detects PROFINET communication problems and reports them to the user via the Web-UI.
Siemens SINEC Traffic Analyzer has an insufficient credential protection vulnerability, which is caused by the web server storing passwords in plain text, which can be exploited by attackers to obtain access passwords
| VAR-202406-0060 | CVE-2024-35207 | Siemens' sinec traffic analyzer Cross-site request forgery vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery(CSRF) attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user. Siemens' sinec traffic analyzer Contains a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SINEC Traffic Analyzer is an on-premises application that monitors PNIO (PROFINET IO) communication between controllers and IO devices. The software detects PROFINET communication problems and reports them to the user via the Web-UI
| VAR-202406-0061 | CVE-2024-35206 | Siemens' sinec traffic analyzer Session deadline vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.7 Severity: High |
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected application does not expire the session. This could allow an attacker to get unauthorized access. Siemens' sinec traffic analyzer contains a session expiration vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SINEC Traffic Analyzer is an on-premises application that monitors PNIO (PROFINET IO) communication between controllers and IO devices. The software detects PROFINET communication problems and reports them to the user via the Web-UI
| VAR-202406-0042 | CVE-2023-50763 | Siemens TIM 1531 IRC infinite loop vulnerability |
CVSS V2: 6.8 CVSS V3: 4.9 Severity: MEDIUM |
A vulnerability has been identified in SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.4.8), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.4.8). The web server of affected products, if configured to allow the import of PKCS12 containers, could end up in an infinite loop when processing incomplete certificate chains.
This could allow an authenticated remote attacker to create a denial of service condition by importing specially crafted PKCS12 containers. TIM 1531 IRC is a communication module for SIMATIC S7-1500, S7-400, S7-300
| VAR-202406-0184 | CVE-2023-38533 | Siemens' TIA Administrator Vulnerability in creating temporary files for access permission directories in |
CVSS V2: 1.7 CVSS V3: 3.3 Severity: Medium |
A vulnerability has been identified in TIA Administrator (All versions < V3 SP2). The affected component creates temporary download files in a directory with insecure permissions. This could allow any authenticated attacker on Windows to disrupt the update process. Siemens' TIA Administrator Contains a vulnerability in creating temporary files in the access permission directory.Service operation interruption (DoS) It may be in a state. TIA Administrator is a web-based framework that can merge different functional modules to complete management tasks and manage SIMATIC software and license functions
| VAR-202406-0183 | CVE-2024-36266 | Siemens' PowerSys Authentication vulnerability in |
CVSS V2: 7.2 CVSS V3: 9.3 Severity: High |
A vulnerability has been identified in PowerSys (All versions < V3.11). The affected application insufficiently protects responses to authentication requests. This could allow a local attacker to bypass authentication, thereby gaining administrative privileges for the managed remote devices. Siemens' PowerSys There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. PowerSys is a service program used for debugging, maintenance and diagnosis of PowerLink 50/100 or SWT 3000 devices
| VAR-202406-0058 | CVE-2023-51634 | of netgear RAX30 Certificate validation vulnerability in firmware |
CVSS V2: 6.8 CVSS V3: 7.5 Severity: HIGH |
NETGEAR RAX30 Improper Certificate Validation Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-19589. (DoS) It may be in a state. NETGEAR RAX30 is a WiFi 6 router launched by NETGEAR. It supports dual bands (2.4GHz and 5GHz), has a maximum transmission rate of 2400Mbps, uses three external antennas, is equipped with a 1.5GHz triple-core processor, and can connect 20 devices at the same time.
NETGEAR RAX30 has a trust management problem vulnerability
| VAR-202406-0094 | CVE-2023-51635 | of netgear RAX30 Out-of-bounds write vulnerability in firmware |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
NETGEAR RAX30 fing_dil Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within fing_dil service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19843. of netgear RAX30 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR RAX30 is a dual-band wireless router from NETGEAR
| VAR-202406-2007 | CVE-2024-36792 | of netgear WNR614 Vulnerability in firmware regarding storing critical information in plaintext in memory |
CVSS V2: 8.5 CVSS V3: 8.2 Severity: HIGH |
An issue in the implementation of the WPS in Netgear WNR614 JNR1010V2/N300-V1.1.0.54_1.0.1 allows attackers to gain access to the router's pin. of netgear WNR614 The firmware contains a vulnerability related to storing sensitive information in plaintext in memory.Information may be obtained and information may be tampered with. NETGEAR WNR614 is an N300 wireless router with an external antenna from Netgear. The vulnerability is caused by a problem in the WPS implementation. Attackers can exploit this vulnerability to access the router's password
| VAR-202406-1057 | CVE-2024-36790 | of netgear WNR614 Vulnerability related to plaintext storage of important information in firmware |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
Netgear WNR614 JNR1010V2/N300-V1.1.0.54_1.0.1 was discovered to store credentials in plaintext. of netgear WNR614 The firmware contains a vulnerability related to plaintext storage of sensitive information.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Netgear WNR614 is a N300 wireless router with an external antenna from Netgear.
Netgear WNR614 has a security vulnerability that is caused by storing credentials in plain text. No detailed vulnerability details are provided at this time
| VAR-202406-1250 | CVE-2024-36789 | of netgear WNR614 Weak password requirement vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 8.1 Severity: HIGH |
An issue in Netgear WNR614 JNR1010V2/N300-V1.1.0.54_1.0.1 allows attackers to create passwords that do not conform to defined security standards. of netgear WNR614 A weak password requirement vulnerability exists in the firmware.Information may be obtained and information may be tampered with. Netgear WNR614 is an N300 wireless router with an external antenna from Netgear. No detailed vulnerability details are available at this time
| VAR-202406-2616 | CVE-2024-36788 | of netgear WNR614 Firmware vulnerabilities |
CVSS V2: 4.0 CVSS V3: 4.8 Severity: MEDIUM |
Netgear WNR614 JNR1010V2 N300-V1.1.0.54_1.0.1 does not properly set the HTTPOnly flag for cookies. This allows attackers to possibly intercept and access sensitive communications between the router and connected devices. of netgear WNR614 There are unspecified vulnerabilities in the firmware.Information may be obtained and information may be tampered with. Netgear WNR614 is an N300 wireless router with an external antenna from Netgear
| VAR-202406-1455 | CVE-2024-36787 | of netgear WNR614 Weak authentication vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: HIGH |
An issue in Netgear WNR614 JNR1010V2 N300-V1.1.0.54_1.0.1 allows attackers to bypass authentication and access the administrative interface via unspecified vectors. of netgear WNR614 The firmware contains a vulnerability related to weak authentication.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR WNR614 is a N300 wireless router with an external antenna from Netgear. No detailed vulnerability details are currently available