VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202108-0554 CVE-2021-0114 plural  Intel(R) Processor  Firmware initialization vulnerabilities CVSS V2: 7.2
CVSS V3: 6.7
Severity: MEDIUM
Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access. plural Intel(R) Processor There is an initialization vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202108-0517 CVE-2021-21599 Dell EMC PowerScale OneFS  In  OS  Command injection vulnerability CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Dell EMC PowerScale OneFS versions 8.2.x - 9.2.1.x contain an OS command injection vulnerability. This may allow a user with ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE to escalate privileges and escape the compliance guarantees. This only impacts Smartlock WORM compliance mode clusters as a critical vulnerability and Dell recommends to update/upgrade at the earliest opportunity. (DoS) It may be in a state. DELL EMC PowerScale is a scale-out storage system for unstructured data from Dell (DELL). A security vulnerability exists in Dell EMC PowerScale OneFS that allows users using ISI PRIV LOGIN SSH or ISI PRIV LOGIN CONSOLE to escalate privileges and evade compliance guarantees
VAR-202108-0513 CVE-2021-21595 Dell EMC PowerScale OneFS  Command injection vulnerability in CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Dell EMC PowerScale OneFS versions 8.2.x - 9.1.1.x contain an improper neutralization of special elements used in an OS command. This vulnerability could allow the compadmin user to elevate privileges. This only impacts Smartlock WORM compliance mode clusters as a critical vulnerability and Dell recommends to update/upgrade at the earliest opportunity. Dell EMC PowerScale OneFS Contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. DELL EMC PowerScale is a scale-out storage system for unstructured data from Dell (DELL)
VAR-202108-0512 CVE-2021-21594 Dell EMC PowerScale OneFS  In  GET  Vulnerability regarding information leakage from query string in request CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Dell PowerScale OneFS versions 8.2.2 - 9.1.0.x contain a use of get request method with sensitive query strings vulnerability. It can lead to potential disclosure of sensitive data. Dell recommends upgrading at your earliest opportunity. Dell Technologies Dell PowerScale OneFS is an operating system of Dell Technologies in the United States. Offers the PowerScale OneFS operating system for scale-out NAS
VAR-202108-0511 CVE-2021-21592 Dell EMC PowerScale OneFS  Vulnerability in handling exceptional conditions in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x improperly handle an exceptional condition. A remote low privileged user could potentially exploit this vulnerability, leading to unauthorized information disclosure. DELL EMC PowerScale is a scale-out storage system for unstructured data from Dell (DELL)
VAR-202108-0404 CVE-2021-21568 Dell EMC PowerScale OneFS  Vulnerability in CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x contain an insufficient logging vulnerability. An authenticated user with ISI_PRIV_LOGIN_PAPI could make un-audited and un-trackable configuration changes to settings that their roles have privileges to change. Dell EMC PowerScale OneFS Exists in unspecified vulnerabilities.Information may be tampered with. DELL EMC PowerScale is a scale-out storage system for unstructured data from Dell (DELL). A security vulnerability exists in Dell EMC PowerScale OneFS where users authenticated through the ISI PRIV LOGIN PAPI can make unaudited and untraceable configuration changes to settings that their role has permission to change
VAR-202108-2479 No CVE Ruijie Networks Co., Ltd. RG-NBR800GW has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
RG-NBR800GW is an Internet behavior management router launched by Ruijie. It is a router designed for all office scenarios. Ruijie Networks Co., Ltd. RG-NBR800GW has a weak password vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202108-2314 No CVE Information disclosure vulnerability exists in Kyan network monitoring equipment (CNVD-2021-49589) CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Kyan is a network monitoring device. Kyan network monitoring equipment has an information disclosure vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2306 No CVE Tenda AC9 has a denial of service vulnerability (CNVD-2021-51322) CVSS V2: 5.5
CVSS V3: -
Severity: MEDIUM
Tenda AC9 is a wireless router with gigabit Ethernet port launched by Shenzhen Jixiang Tenda Technology Co., Ltd. Tenda AC9 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202108-2311 No CVE Sangfor Technology Co., Ltd. MIG 5.3 has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Sangfor Technology Co., Ltd. is a provider of products, services and solutions focusing on enterprise-level security, cloud computing and infrastructure. Sangfor Technology Co., Ltd. MIG 5.3 has a command execution vulnerability, which can be exploited by attackers to gain server control rights.
VAR-202108-2568 No CVE Ruijie Networks Co., Ltd. RG-NBR700W has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
RG-NBR700W is an Internet behavior management router, which is specially designed for all office scenarios. Ruijie Networks Co., Ltd. RG-NBR700W has a weak password vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202108-2312 No CVE ZTE Corporation W908-A10000 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
W908-A10000 is a wireless controller of ZTE Corporation. ZTE Corporation W908-A10000 has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2313 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. EG Easy Gateway has an arbitrary file reading vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of network equipment product lines and solutions including switches, routers, software, security firewalls, wireless products, and storage. Beijing StarNet Ruijie Networks Technology Co., Ltd. EG Easy Gateway has an arbitrary file reading vulnerability. Attackers can use this vulnerability to obtain sensitive system information.
VAR-202108-2336 No CVE Unauthorized access vulnerability exists in Axis 233D Network Dome Camera CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
233D is a network camera. Axis 233D Network Dome Camera has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2505 No CVE Dell Color MFP S2825cdn has unauthorized access vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Dell Color MFP S2825cdn is a printer device. Dell Color MFP S2825cdn has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2561 No CVE Honeywell (China) Co., Ltd. Hybrid Alarm Receiver (Professional Edition) has SQL injection vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Honeywell (China) Co., Ltd. is a part of Honeywell International, a diversified, high-tech advanced manufacturing company. Honeywell (China) Co., Ltd. Hybrid Alarm Receiver (Professional Edition) has a SQL injection vulnerability. Attackers can use this vulnerability to obtain sensitive information in the database.
VAR-202108-2573 No CVE NNETGEAR GS748Tv5 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
NETGEAR GS748Tv5 is a Gigabit Ethernet switch. NNETGEAR GS748Tv5 has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-2477 No CVE Ricoh (China) Investment Co., Ltd. RICOH Aficio MP C305 has an unauthorized access vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Ricoh (China) Investment Co., Ltd. provides office image processing equipment (such as MFPs, printers, etc.), production digital printers, etc., such as document output management services and IT solutions. Ricoh (China) Investment Co., Ltd. RICOH Aficio MP C305 has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202108-0118 CVE-2020-18757 Dut Computer Control Engineering Co. PLC MAC1100  Vulnerability regarding lack of authentication in CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
An issue in Dut Computer Control Engineering Co.'s PLC MAC1100 allows attackers to cause persistent denial of service (DOS) via a crafted packet. Dut Computer Control Engineering Co. PLC MAC1100 Exists in a vulnerability related to the lack of authentication.Service operation interruption (DoS) It may be in a state. MAC1100 PLC is an industrial control product PLC
VAR-202108-0115 CVE-2020-18753 Dut Computer Control Engineering Co. PLC MAC1100  Vulnerability regarding lack of authentication in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue in Dut Computer Control Engineering Co.'s PLC MAC1100 allows attackers to gain access to the system and escalate privileges via a crafted packet. Dut Computer Control Engineering Co. PLC MAC1100 Exists in a vulnerability related to the lack of authentication.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. MAC1100 PLC is an industrial control product PLC. There is a security loophole in MAC1100 PLC. Attackers can use this loophole to access the system and upgrade privileges through an elaborate package