VARIoT IoT vulnerabilities database
| VAR-202202-0285 | CVE-2022-22811 | spaceLYnk Cross-site request forgery vulnerability |
CVSS V2: 8.8 CVSS V3: 8.1 Severity: HIGH |
A CWE-352: Cross-Site Request Forgery (CSRF) vulnerability exists that could induce users to perform unintended actions, leading to the override of the system?s configurations when an attacker persuades a user to visit a rogue website. Affected Product: spaceLYnk (V2.6.2 and prior), Wiser for KNX (formerly homeLYnk) (V2.6.2 and prior), fellerLYnk (V2.6.2 and prior)
| VAR-202202-0004 | CVE-2021-44018 | Buffer error vulnerability in multiple Siemens products |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in JT2Go (All versions < V13.2.0.7), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V13.1 (All versions < V13.1.0.9), Teamcenter Visualization V13.2 (All versions < V13.2.0.7), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15112). Zero Day Initiative To this vulnerability ZDI-CAN-15112 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Crafted data in a PAR file can trigger a read past the end of an allocated buffer
| VAR-202202-0423 | CVE-2021-37107 | EMUI Out-of-bounds write vulnerability in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
There is an improper memory access permission configuration on ACPU.Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI Exists in an out-of-bounds write vulnerability.Information may be obtained. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
| VAR-202202-0456 | CVE-2021-23152 | Intel(R) Advisor Software vulnerabilities |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper access control in the Intel(R) Advisor software before version 2021.2 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) Advisor There are unspecified vulnerabilities in the software.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Intel Advisor is a design and analysis tool developed by Intel Corporation for developing high-performance code. A security vulnerability exists in Intel Advisor software
| VAR-202202-0460 | CVE-2021-33101 | Intel(R) GPA Uncontrolled Search Path Element Vulnerability in Software |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Uncontrolled search path in the Intel(R) GPA software before version 21.2 may allow an authenticated user to potentially enable escalation of privilege via local access. (DoS) It may be in a state. Intel Graphics Performance Analyzers (Intel Gpa) is a graphics performance analyzer from Intel Corporation of the United States
| VAR-202202-0453 | CVE-2021-44454 | Intel(R) Quartus(R) Prime Pro Edition Input verification vulnerability in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper input validation in a third-party component for Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an authenticated user to potentially enable escalation of privilege via local access. (DoS) It may be in a state. Intel Quartus Prime Pro is a multi-platform design environment developed by Intel Corporation. This product is mainly used for programmable logic device programming. Intel Quartus Prime Pro Edition has a security vulnerability that stems from a potential security vulnerability in Intel Quartus Prime Pro and Standard Edition. An attacker could exploit this vulnerability to cause privilege escalation, denial of service, or information disclosure
| VAR-202202-1292 | CVE-2022-24667 | swift-nio-http2 Integer overflow vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted HPACK-encoded header block. This attack affects all swift-nio-http2 versions from 1.0.0 to 1.19.1. There are a number of implementation errors in the parsing of HPACK-encoded header blocks that allow maliciously crafted HPACK header blocks to cause crashes in processes using swift-nio-http2. Each of these crashes is triggered instead of an integer overflow. A malicious HPACK header block could be sent on any of the HPACK-carrying frames in a HTTP/2 connection (HEADERS and PUSH_PROMISE), at any position. Sending a HPACK header block does not require any special permission, so any HTTP/2 connection peer may send one. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack. The attack is low-effort: it takes very little resources to send an appropriately crafted field block. The impact on availability is high: receiving a frame carrying this field block immediately crashes the server, dropping all in-flight connections and causing the service to need to restart. It is straightforward for an attacker to repeatedly send appropriately crafted field blocks, so attackers require very few resources to achieve a substantial denial of service. The attack does not have any confidentiality or integrity risks in and of itself: swift-nio-http2 is parsing the field block in memory-safe code and the crash is triggered instead of an integer overflow. However, sudden process crashes can lead to violations of invariants in services, so it is possible that this attack can be used to trigger an error condition that has confidentiality or integrity risks. The risk can be mitigated if untrusted peers can be prevented from communicating with the service. This mitigation is not available to many services. The issue is fixed by rewriting the parsing code to correctly handle all conditions in the function. The principal issue was found by automated fuzzing by oss-fuzz, but several associated bugs in the same code were found by code audit and fixed at the same time. swift-nio-http2 Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202202-1311 | CVE-2021-39986 | EMUI Vulnerability in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality. EMUI Exists in unspecified vulnerabilities.Information may be obtained. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
| VAR-202202-0243 | CVE-2022-24317 | Interactive Graphical SCADA System Data Server Vulnerability regarding lack of authentication in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A CWE-862: Missing Authorization vulnerability exists that could cause information exposure when an attacker sends a specific message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior). This vulnerability allows remote attackers to disclose sensitive information on affected installations of Schneider Electric IGSS. Authentication is not required to exploit this vulnerability.The specific flaw exists within the IGSSDataServer process, which listens on TCP port 12401 by default. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose information from the IGSS application. Schneider Electric Interactive Graphical SCADA System (IGSS) is a set of SCADA (Data Acquisition and Supervisory Control System) systems used by Schneider Electric in France to monitor and control industrial processes
| VAR-202202-0241 | CVE-2022-24320 | plural Schneider Electric Vulnerability related to certificate validation in products |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
A CWE-295: Improper Certificate Validation vulnerability exists that could allow a Man-in-theMiddle attack when communications between the client and Geo SCADA database server are intercepted. Affected Product: ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)
| VAR-202202-0452 | CVE-2022-21205 | Intel(R) Quartus(R) Prime Pro Edition In XML External entity vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Improper restriction of XML external entity reference in DSP Builder Pro for Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an unauthenticated user to potentially enable information disclosure via network access. Intel(R) Quartus(R) Prime Pro Edition for, XML There is a vulnerability in an external entity.Information may be obtained. Both Intel Quartus Prime Pro and Intel Quartus Prime are products of Intel Corporation of the United States. Intel Quartus Prime Pro is a multi-platform design environment. This product is mainly used for programmable logic device programming. Intel Quartus Prime is a programmable logic device tool for designing and developing FPGAs. An attacker could exploit this vulnerability to cause privilege escalation, denial of service, or information disclosure
| VAR-202202-1330 | CVE-2021-33119 | Intel(R) RealSense(TM) DCM Vulnerability in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Improper access control in the Intel(R) RealSense(TM) DCM before version 20210625 may allow an authenticated user to potentially enable information disclosure via local access. Intel(R) RealSense(TM) DCM Exists in unspecified vulnerabilities.Information may be obtained
| VAR-202202-1309 | CVE-2021-39997 | EMUI Input verification vulnerability in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
There is a vulnerability of unstrict input parameter verification in the audio assembly.Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
| VAR-202202-1310 | CVE-2021-39992 | EMUI Vulnerability in improper permission assignment for critical resources in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
There is an improper security permission configuration vulnerability on ACPU.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability. (DoS) It may be in a state. Huawei EMUI is an Android-based mobile operating system developed by China's Huawei (Huawei). An attacker could exploit this vulnerability to execute arbitrary code on the system
| VAR-202202-1331 | CVE-2022-21157 | Intel(R) Smart Campus Android Incorrect Authentication Vulnerability in Applications |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Improper access control in the Intel(R) Smart Campus Android application before version 6.1 may allow authenticated user to potentially enable information disclosure via local access. Intel(R) Smart Campus Android The application contains an incorrect authentication vulnerability.Information may be obtained
| VAR-202202-0454 | CVE-2022-21220 | Intel(R) Quartus(R) Prime Pro Edition In XML External entity vulnerabilities |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper restriction of XML external entity for Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an authenticated user to potentially enable escalation of privilege via local access. (DoS) It may be in a state. Intel Quartus Prime Pro is a multi-platform design environment developed by Intel Corporation. This product is mainly used for programmable logic device programming. Intel Quartus Prime Pro Edition has a security vulnerability that stems from a potential security vulnerability in Intel Quartus Prime Pro and Standard Edition. An attacker could exploit this vulnerability to cause privilege escalation, denial of service, or information disclosure
| VAR-202202-0242 | CVE-2022-24311 | Interactive Graphical SCADA System Data Server Past traversal vulnerability in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory vulnerability exists that could cause modification of an existing file by inserting at beginning of file or create a new file in the context of the Data Server potentially leading to remote code execution when an attacker sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior). (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric IGSS. Authentication is not required to exploit this vulnerability.The specific flaw exists within the IGSSDataServer process, which listens on TCP port 12401 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user
| VAR-202202-1924 | No CVE | Logic flaws in Tuya smart app and Tuya converter (smart socket) |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Tuya Smart is an IoT cloud platform that connects the intelligent needs of brands, OEM manufacturers, developers and chain retailers, and provides a one-stop AI IoT PaaS-level solution, covering hardware development, global cloud, and smart business platform development , providing comprehensive ecological empowerment.
The Tuya smart app and Tuya converter (smart socket) have a logic flaw vulnerability. The vulnerability stems from not using a secure encryption algorithm (AES/ECB) during the communication between Tuya smart app and Tuya converter (smart socket). Vulnerabilities can be exploited to obtain encrypted message instructions to reconstruct (modify) message packets and calculate corresponding checksums.
| VAR-202202-1319 | CVE-2021-36302 | Dell EMC Integrated System for Microsoft Azure Stack Hub Vulnerability in privilege management in |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
All Dell EMC Integrated System for Microsoft Azure Stack Hub versions contain a privilege escalation vulnerability. A remote malicious user with standard level JEA credentials may potentially exploit this vulnerability to elevate privileges and take over the system. (DoS) It may be in a state
| VAR-202202-1300 | CVE-2022-20044 | Android Vulnerability in using free memory in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
In Bluetooth, there is a possible service crash due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06126814; Issue ID: ALPS06126814. Android contains a use-of-freed memory vulnerability. This vulnerability is Patch ID: ALPS06126814 and Issue ID: ALPS06126814 It is published as.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state