VARIoT IoT vulnerabilities database
| VAR-202202-1046 | CVE-2021-36193 | FortiWeb Out-of-bounds write vulnerability in |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
Multiple stack-based buffer overflows in the command line interpreter of FortiWeb before 6.4.2 may allow an authenticated attacker to achieve arbitrary code execution via specially crafted commands. FortiWeb Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiWeb is a web application layer firewall developed by Fortinet, which can block threats such as cross-site scripting, SQL injection, cookie poisoning, schema poisoning, etc., to ensure the security of web applications and protect sensitive database content
| VAR-202202-1077 | CVE-2021-36177 | FortiAuthenticator Vulnerability in |
CVSS V2: 3.3 CVSS V3: 4.3 Severity: MEDIUM |
An improper access control vulnerability [CWE-284] in FortiAuthenticator HA service 6.3.2 and below, 6.2.x, 6.1.x, 6.0.x may allow an attacker on the same vlan as the HA management interface to make an unauthenticated direct connection to the FAC's database. FortiAuthenticator Exists in unspecified vulnerabilities.Information may be obtained. Fortinet FortiAuthenticator is a centralized user identity management solution from Fortinet
| VAR-202202-1102 | CVE-2022-20680 | Cisco Prime Service Catalog Vulnerability in privilege management in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Prime Service Catalog could allow an authenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to improper enforcement of Administrator privilege levels for low-value sensitive data. An attacker with read-only Administrator access to the web-based management interface could exploit this vulnerability by sending a malicious HTTP request to the page that contains the sensitive data. A successful exploit could allow the attacker to collect sensitive information about users of the system and orders that have been placed using the application
| VAR-202202-1748 | CVE-2021-42753 | FortiWeb Past traversal vulnerability in |
CVSS V2: 8.5 CVSS V3: 8.1 Severity: HIGH |
An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in FortiWeb management interface 6.4.1 and below, 6.3.15 and below, 6.2.x, 6.1.x, 6.0.x, 5.9.x and 5.8.x may allow an authenticated attacker to perform an arbitrary file and directory deletion in the device filesystem. FortiWeb Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Fortinet FortiWeb is a web application layer firewall developed by Fortinet, which can block threats such as cross-site scripting, SQL injection, cookie poisoning, schema poisoning, etc., to ensure the security of web applications and protect sensitive database content
| VAR-202202-1696 | CVE-2022-22510 | Codesys Profinet In NULL Pointer dereference vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Codesys Profinet in version V4.2.0.0 is prone to null pointer dereference that allows a denial of service (DoS) attack of an unauthenticated user via SNMP. Codesys Profinet for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. Profinet is an open industrial Ethernet communication protocol proposed by the PROFIBUS & PROFINET International Association. No detailed vulnerability details are currently provided
| VAR-202202-1098 | CVE-2022-20630 | Cisco DNA Center Vulnerability regarding information leakage from log files in |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
A vulnerability in the audit log of Cisco DNA Center could allow an authenticated, local attacker to view sensitive information in clear text. This vulnerability is due to the unsecured logging of sensitive information on an affected system. An attacker with administrative privileges could exploit this vulnerability by accessing the audit logs through the CLI. A successful exploit could allow the attacker to retrieve sensitive information that includes user credentials
| VAR-202202-1739 | CVE-2021-43073 | Fortinet FortiWeb In OS Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests. Fortinet FortiWeb for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiWeb is a web application layer firewall from Fortinet. It can block threats such as cross-site scripting, SQL injection, cookie poisoning, schema poisoning, etc., to ensure the security of web applications and protect sensitive database content. No detailed vulnerability details are currently provided
| VAR-202202-1031 | CVE-2021-39070 | IBM Security Verify Access Vulnerability in |
CVSS V2: 6.8 CVSS V3: 9.8 Severity: CRITICAL |
IBM Security Verify Access 10.0.0.0, 10.0.1.0 and 10.0.2.0 with the advanced access control authentication service enabled could allow an attacker to authenticate as any user on the system. IBM X-Force ID: 215353. Vendor exploits this vulnerability IBM X-Force ID: 215353 It is published as.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202202-1222 | CVE-2021-41016 | Fortinet FortiExtender In OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A improper neutralization of special elements used in a command ('command injection') in Fortinet FortiExtender version 7.0.1 and below, 4.2.3 and below, 4.1.7 and below allows an authenticated attacker to execute privileged shell commands via CLI commands including special characters. Fortinet FortiExtender for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiExtender is a wireless WAN (Wide Area Network) extender device from Fortinet
| VAR-202202-1278 | CVE-2022-20699 | plural Cisco Small Business RV Series router out-of-bounds write vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco Small Business RV Series routers contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco RV340 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the SSL VPN service, which listens on TCP port 8443 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root
| VAR-202202-0007 | CVE-2020-5953 | InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM |
CVSS V2: 6.9 CVSS V3: 7.5 Severity: HIGH |
A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM. This can result in code execution in SMM (escalating privilege from ring 0 to ring -2). The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count
SMM Privilege Escalation 10
SMM Memory Corruption 12
DXE Memory Corruption 1CVE-2020-27339 Affected
CVE-2020-5953 Affected
CVE-2021-33625 Affected
CVE-2021-33626 Affected
CVE-2021-33627 Affected
CVE-2021-41837 Affected
CVE-2021-41838 Affected
CVE-2021-41839 Affected
CVE-2021-41840 Affected
CVE-2021-41841 Affected
CVE-2021-42059 Affected
CVE-2021-42060 Not Affected
CVE-2021-42113 Affected
CVE-2021-42554 Affected
CVE-2021-43323 Affected
CVE-2021-43522 Affected
CVE-2021-43615 Not Affected
CVE-2021-45969 Not Affected
CVE-2021-45970 Not Affected
CVE-2021-45971 Not Affected
CVE-2022-24030 Not Affected
CVE-2022-24031 Not Affected
CVE-2022-24069 Not Affected
CVE-2022-28806 Unknown. InsydeH2O UEFI There is an unspecified vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202202-1180 | CVE-2021-21968 | Sealevel Systems, Inc. SeaConnect 370W Input verification vulnerability in |
CVSS V2: 6.8 CVSS V3: 8.3 Severity: HIGH |
A file write vulnerability exists in the OTA update task functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted MQTT payload can lead to arbitrary file overwrite. An attacker can perform a man-in-the-middle attack to trigger this vulnerability. Sealevel Systems, Inc. SeaConnect 370W There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Used to remotely monitor and control the status of the actual I/O process
| VAR-202202-0009 | CVE-2021-33627 | InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM |
CVSS V2: 7.2 CVSS V3: 8.2 Severity: HIGH |
An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.09.11, 5.1 before 05.17.11, 5.2 before 05.27.11, 5.3 before 05.36.11, 5.4 before 05.44.11, and 5.5 before 05.52.11 affecting FwBlockServiceSmm. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count
SMM Privilege Escalation 10
SMM Memory Corruption 12
DXE Memory Corruption 1CVE-2020-27339 Affected
CVE-2020-5953 Affected
CVE-2021-33625 Affected
CVE-2021-33626 Affected
CVE-2021-33627 Affected
CVE-2021-41837 Affected
CVE-2021-41838 Affected
CVE-2021-41839 Affected
CVE-2021-41840 Affected
CVE-2021-41841 Affected
CVE-2021-42059 Affected
CVE-2021-42060 Not Affected
CVE-2021-42113 Affected
CVE-2021-42554 Affected
CVE-2021-43323 Affected
CVE-2021-43522 Affected
CVE-2021-43615 Not Affected
CVE-2021-45969 Not Affected
CVE-2021-45970 Not Affected
CVE-2021-45971 Not Affected
CVE-2022-24030 Not Affected
CVE-2022-24031 Not Affected
CVE-2022-24069 Not Affected
CVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202202-1182 | CVE-2021-21961 | Sealevel Systems, Inc. SeaConnect 370W Out-of-bounds write vulnerability in |
CVSS V2: 7.5 CVSS V3: 10.0 Severity: CRITICAL |
A stack-based buffer overflow vulnerability exists in the NBNS functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted network packet can lead to remote code execution. An attacker can send a malicious packet to trigger this vulnerability. Sealevel Systems, Inc. SeaConnect 370W Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Used to remotely monitor and control the status of the actual I/O process
| VAR-202202-0102 | CVE-2021-41838 | InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM |
CVSS V2: 7.2 CVSS V3: 8.2 Severity: HIGH |
An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count
SMM Privilege Escalation 10
SMM Memory Corruption 12
DXE Memory Corruption 1CVE-2020-27339 Affected
CVE-2020-5953 Affected
CVE-2021-33625 Affected
CVE-2021-33626 Affected
CVE-2021-33627 Affected
CVE-2021-41837 Affected
CVE-2021-41838 Affected
CVE-2021-41839 Affected
CVE-2021-41840 Affected
CVE-2021-41841 Affected
CVE-2021-42059 Affected
CVE-2021-42060 Not Affected
CVE-2021-42113 Affected
CVE-2021-42554 Affected
CVE-2021-43323 Affected
CVE-2021-43522 Affected
CVE-2021-43615 Not Affected
CVE-2021-45969 Not Affected
CVE-2021-45970 Not Affected
CVE-2021-45971 Not Affected
CVE-2022-24030 Not Affected
CVE-2022-24031 Not Affected
CVE-2022-24069 Not Affected
CVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202202-1220 | CVE-2021-21959 | Sealevel Systems SeaConnect 370W Trust Management Issue Vulnerability |
CVSS V2: 6.8 CVSS V3: 8.1 Severity: HIGH |
A misconfiguration exists in the MQTTS functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. This misconfiguration significantly simplifies a man-in-the-middle attack, which directly leads to control of device functionality. SeaConnect 370W Exists in a certificate validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Used to remotely monitor and control the status of the actual I/O process
| VAR-202202-1821 | CVE-2021-21962 | Sealevel Systems, Inc. SeaConnect 370W Out-of-bounds write vulnerability in |
CVSS V2: 6.8 CVSS V3: 8.1 Severity: HIGH |
A heap-based buffer overflow vulnerability exists in the OTA Update u-download functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A series of specially-crafted MQTT payloads can lead to remote code execution. An attacker must perform a man-in-the-middle attack in order to trigger this vulnerability. Sealevel Systems, Inc. SeaConnect 370W Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Used to remotely monitor and control the status of the actual I/O process
| VAR-202202-1200 | CVE-2021-24868 | Document Embedder WordPress Resource disclosure vulnerability in wrong area in plugin |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
The Document Embedder WordPress plugin before 1.7.9 contains a AJAX action endpoint, which could allow any authenticated user, such as subscriber to enumerate the title of arbitrary private and draft posts. Document Embedder WordPress The plugin contains a resource disclosure vulnerability in the wrong area.Information may be obtained
| VAR-202202-0129 | CVE-2021-42059 | InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.08.41, Kernel 5.1 before 05.16.41, Kernel 5.2 before 05.26.41, Kernel 5.3 before 05.35.41, and Kernel 5.4 before 05.42.20. A stack-based buffer overflow leads toarbitrary code execution in UEFI DisplayTypeDxe DXE driver. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count
SMM Privilege Escalation 10
SMM Memory Corruption 12
DXE Memory Corruption 1CVE-2020-27339 Affected
CVE-2020-5953 Affected
CVE-2021-33625 Affected
CVE-2021-33626 Affected
CVE-2021-33627 Affected
CVE-2021-41837 Affected
CVE-2021-41838 Affected
CVE-2021-41839 Affected
CVE-2021-41840 Affected
CVE-2021-41841 Affected
CVE-2021-42059 Affected
CVE-2021-42060 Not Affected
CVE-2021-42113 Affected
CVE-2021-42554 Affected
CVE-2021-43323 Affected
CVE-2021-43522 Affected
CVE-2021-43615 Not Affected
CVE-2021-45969 Not Affected
CVE-2021-45970 Not Affected
CVE-2021-45971 Not Affected
CVE-2022-24030 Not Affected
CVE-2022-24031 Not Affected
CVE-2022-24069 Not Affected
CVE-2022-28806 Unknown. Insyde InsydeH2O Kernel Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202202-1181 | CVE-2021-21960 | Sealevel Systems, Inc. SeaConnect 370W Out-of-bounds write vulnerability in |
CVSS V2: 7.5 CVSS V3: 10.0 Severity: CRITICAL |
A stack-based buffer overflow vulnerability exists in both the LLMNR functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted network packet can lead to remote code execution. An attacker can send a malicious packet to trigger this vulnerability. Sealevel Systems, Inc. SeaConnect 370W Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Used to remotely monitor and control the status of the actual I/O process