VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202203-0203 CVE-2022-21219 Made by Omron  CX-Programmer  Multiple vulnerabilities in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
Out-of-bounds read vulnerability in CX-Programmer v9.76.1 and earlier which is a part of CX-One (v4.60) suite allows an attacker to cause information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. Provided by Omron Corporation CX-Programmer contains multiple vulnerabilities. * Out-of-bounds writing (CWE-787) - CVE-2022-21124 It was * Use of freed memory (Use-after-free) (CWE-416) - CVE-2022-25230 It was * Use of freed memory (Use-after-free) (CWE-416) - CVE-2022-25325 It was * Out-of-bounds read (CWE-125) - CVE-2022-21219 It was * Out-of-bounds writing (CWE-787) - CVE-2022-25234 This vulnerability information is JPCERT/CC Report to JPCERT/CC Coordinated with the developer
VAR-202203-2122 No CVE KingView (KingView) has a logic flaw vulnerability CVSS V2: 3.6
CVSS V3: -
Severity: LOW
KingView (KingView) is the flagship brand in the field of equipment monitoring in China. It has the characteristics of complete functions, simple, easy to learn, and easy to use. Its products are widely used in dozens of industries such as electric power, machinery, municipal administration, energy, environmental protection, and medicine. Hundreds of equipment supporting monitoring such as low-voltage power distribution, hoisting machinery, vacuum furnace, heat exchange station, fan power generation, dust blowing and dust removal, air separation equipment, pharmaceutical freeze dryer and so on. There is a logic flaw vulnerability in KingView, an attacker can use this vulnerability to overwrite and delete any file.
VAR-202203-0234 CVE-2022-22946 spring cloud gateway  Certificate validation vulnerabilities in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
In spring cloud gateway versions prior to 3.1.1+ , applications that are configured to enable HTTP2 and no key store or trusted certificates are set will be configured to use an insecure TrustManager. This makes the gateway able to connect to remote services with invalid or custom certificates. spring cloud gateway Exists in a certificate validation vulnerability.Information may be tampered with
VAR-202203-0227 CVE-2022-24915 IPCOMM ipDIO Code Injection Vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
The absence of filters when loading some sections in the web application of the vulnerable device allows attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section where the information is displayed. Injection can be done on specific parameters. The injected code is executed when a legitimate user attempts to upload, copy, download, or delete an existing configuration (Administrative Services). IPCOMM ipDIO is a remote control communication device of German IPCOMM company. Used to record digital and analog inputs and control digital outputs. Attackers can use the vulnerability to inject malicious code. When legitimate users visit the web part of the displayed information, These codes will be explained
VAR-202203-0233 CVE-2022-22947 spring cloud gateway  Code injection vulnerability in CVSS V2: 6.8
CVSS V3: 10.0
Severity: CRITICAL
In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host. (DoS) It may be in a state
VAR-202203-0226 CVE-2022-21146 ipDIO  Cross-site scripting vulnerability in CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Persistent cross-site scripting in the web interface of ipDIO allows an unauthenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into a specific parameter. The XSS payload will be executed when a legitimate user attempts to review history. ipDIO Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. IPCOMM ipDIO is a remote control communication device of German IPCOMM company. Used to record digital and analog inputs and control digital outputs
VAR-202203-0228 CVE-2022-22985 IPCOMM  of  ipDIO  Firmware vulnerabilities CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
The absence of filters when loading some sections in the web application of the vulnerable device allows attackers to inject malicious code that will be interpreted when a legitimate user accesses the specific web section where the information is displayed. Injection can be done on specific parameters. The injected code is executed when a legitimate user attempts to review history. IPCOMM of ipDIO There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. IPCOMM ipDIO is a remote control communication device of German IPCOMM company. Used to record digital and analog inputs and control digital outputs. A code injection vulnerability exists in IPCOMM ipDIO
VAR-202203-0225 CVE-2022-24432 IPCOMM ipDIO Cross-Site Scripting Vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Persistent cross-site scripting (XSS) in the web interface of ipDIO allows an authenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into specific fields. The XSS payload will be executed when a legitimate user attempts to upload, copy, download, or delete an existing configuration (Administrative Services). ipDIO Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. IPCOMM ipDIO is a remote control communication device of German IPCOMM company. Used to record digital and analog inputs and control digital outputs
VAR-202203-2118 No CVE NETGEAR ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 SQL Injection Vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The NETGEAR SRX5308 is a firewall appliance. A SQL injection vulnerability in NETGEAR ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 could allow attackers to obtain sensitive information.
VAR-202203-2098 No CVE Multiple TOTOLink Router Authentication Bypass Vulnerabilities CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
TOTOLink is a brand of mid-to-high-end wireless routers in the Asia-Pacific region. Multiple router authentication bypass vulnerabilities in TOTOLink can be exploited by attackers to execute arbitrary commands on the target device with root privileges.
VAR-202203-1432 CVE-2022-0675 Puppet firewall  Input verification vulnerability in CVSS V2: 6.8
CVSS V3: 9.8
Severity: CRITICAL
In certain situations it is possible for an unmanaged rule to exist on the target system that has the same comment as the rule specified in the manifest. This could allow for unmanaged rules to exist on the target system and leave the system in an unsafe state. Puppet firewall There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat OpenStack Platform 16.2 (puppet-firewall) security update Advisory ID: RHSA-2022:5116-01 Product: Red Hat OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2022:5116 Issue date: 2022-06-22 CVE Names: CVE-2022-0675 ==================================================================== 1. Summary: An update for puppet-firewall is now available for Red Hat OpenStack Platform 16.2.3 (Train). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 16.2 - noarch 3. Description: Manages Firewalls such as iptables Security Fix(es): * unmanaged rules could leave system in an unsafe state via duplicate comment (CVE-2022-0675) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat OpenStack Platform 16.2: Source: puppet-firewall-3.4.0-1.94f707cgit.el8ost.src.rpm noarch: puppet-firewall-3.4.0-1.94f707cgit.el8ost.noarch.rpm Red Hat OpenStack Platform 16.2: Source: puppet-firewall-3.4.0-1.94f707cgit.el8ost.src.rpm noarch: puppet-firewall-3.4.0-1.94f707cgit.el8ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-0675 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYrNY+9zjgjWX9erEAQjp3g//dr6StKxO2eItYO72aTw0lhuSlnbuVBi4 XjyoK/MmgMD7mmIOivMH8x0SQez3i8bbVuNBxY0vzKaBCt2F0A0rvAjU6CfHfQ9X /W0vgYVU25JqCkLa1LKA/uAS4wU3q2RsmRQQkozh93oKGvrxyv1Oavopct34sDUL RaQmvWNpGDM7N4fwsZjZlAaF+zs/LcjnFavBnRM/2V7J49C/SfINpwDWj80rek+j OY234ef9l1QnbKybUX6HVCiQv7aGifcJSqK/Eg+DrZ5U0CaDGYM4zPECIg/HbW44 Z59ezU0gOMOZKbFDd/JsP7F6r0CGEZn+7buL2pDplXJiXQU+/KCb9GGW1kavIJ8B PjuXMG38UwTJTDFJ88sPJlU2nHvGADAUPciymUBCJ/uRYemN5g2qpUw3XNUGPXrD zDsP6SY0CTjWDTcdq8fY6m3H1sqe+cICxww/gWhRf+uLaCHtAN/Blt9rKAkdXxNn +BPlNcSUtCStt7B1WWA0kiU+uE84t9if4jSQ9E30qusYYkAOhoJG2mIMBnCuaRoX MOE8X87XJMSFptq+y0rHQnPeG++W/qnsZ1Ck++9rNQwrP0Qme7PbcyLn9Yozkd00 4QqyaBWq+CwKGAkO6CCkloq8HImfelXPr1lq2GdartSiZoLnbOITLL+cqmmBV61W c2vGSnm9MKo=lq7X -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
VAR-202203-0835 CVE-2022-20754 Cisco Expressway  Series and  Cisco TelePresence Video Communication Server  Vulnerability in CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read/write privileges to the application to write files or execute arbitrary code on the underlying operating system of an affected device as the root user. For more information about these vulnerabilities, see the Details section of this advisory. (DoS) It may be in a state
VAR-202203-0836 CVE-2022-20755 Cisco Expressway  Series and  Cisco TelePresence Video Communication Server  Vulnerability in CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read/write privileges to the application to write files or execute arbitrary code on the underlying operating system of an affected device as the root user. For more information about these vulnerabilities, see the Details section of this advisory. (DoS) It may be in a state
VAR-202203-0900 CVE-2022-22301 FortiAP-C  in the console  OS  Command injection vulnerability CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] in FortiAP-C console 5.4.0 through 5.4.3, 5.2.0 through 5.2.1 may allow an authenticated attacker to execute unauthorized commands by running CLI commands with specifically crafted arguments. FortiAP-C In the console, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202203-1440 CVE-2021-44166 FortiToken Mobile external push notification  Vulnerability in CVSS V2: 3.5
CVSS V3: 4.1
Severity: MEDIUM
An improper access control vulnerability [CWE-284 ] in FortiToken Mobile (Android) external push notification 5.1.0 and below may allow a remote attacker having already obtained a user's password to access the protected system during the 2FA procedure, even though the deny button is clicked by the legitimate user. FortiToken Mobile (Android) external push notification Exists in unspecified vulnerabilities.Information may be tampered with. Fortinet FortiToken Mobile is an Oath-compliant, event-based, and time-based one-time password (Otp) generator application from Fortinet, Inc., USA. There is an access control error vulnerability in Fortinet FortiToken Mobile 5.1.0 and below. This vulnerability stems from the network system or product not properly restricting resource access from unauthorized roles. Attackers can use this vulnerability to obtain user passwords in 2FA
VAR-202203-1409 CVE-2022-20762 Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure  Software vulnerabilities CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A vulnerability in the Common Execution Environment (CEE) ConfD CLI of Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure (SMI) software could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to insufficient access control in the affected CLI. An attacker could exploit this vulnerability by authenticating as a CEE ConfD CLI user and executing a specific CLI command. A successful exploit could allow an attacker to access privileged containers with root privileges. (DoS) It may be in a state
VAR-202203-0886 CVE-2022-23954 HP PC Input Validation Error Vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service. HP PC is a computer product of Hewlett-Packard (HP) in the United States. No detailed vulnerability details are currently provided
VAR-202203-0885 CVE-2022-23953 plural  HP PC  for product  BIOS  Vulnerability in CVSS V2: 4.9
CVSS V3: 5.5
Severity: MEDIUM
Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service. HP PC is a computer product of Hewlett-Packard (HP) in the United States. No detailed vulnerability details are currently provided
VAR-202203-0889 CVE-2022-23955 plural  HP PC  for product  BIOS  Vulnerability in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service. HP PC is a computer product of Hewlett-Packard (HP) in the United States. No detailed vulnerability details are currently provided
VAR-202203-0870 CVE-2022-20756 Cisco Identity Services Engine  Vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the RADIUS feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause the affected system to stop processing RADIUS packets. This vulnerability is due to improper handling of certain RADIUS requests. An attacker could exploit this vulnerability by attempting to authenticate to a network or a service where the access server is using Cisco ISE as the RADIUS server. A successful exploit could allow the attacker to cause Cisco ISE to stop processing RADIUS requests, causing authentication/authorization timeouts, which would then result in legitimate requests being denied access. Note: To recover the ability to process RADIUS packets, a manual restart of the affected Policy Service Node (PSN) is required. See the Details section for more information. Cisco Identity Services Engine (ISE) Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state