VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202111-1764 CVE-2021-39967 plural  Huawei  Improper Default Permission Vulnerability in Smartphone Products CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei A vulnerability related to improper default permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a sensitive information disclosure vulnerability in the Huawei HarmonyOS SIM dual card management component. An attacker could exploit this vulnerability to compromise confidentiality
VAR-202111-1763 CVE-2021-37118 HarmonyOS  Vulnerability in handling exceptional conditions in CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
The HwNearbyMain module has a Improper Handling of Exceptional Conditions vulnerability.Successful exploitation of this vulnerability may lead to message leak. HarmonyOS Exists in a vulnerability in handling exceptional conditions.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS Vision HwNearbyMain. An attacker could exploit this vulnerability to compromise confidentiality
VAR-202111-1769 CVE-2021-39974 plural  Huawei  Out-of-bounds reading vulnerability in smartphone products CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained
VAR-202111-1767 CVE-2021-37133 HarmonyOS  Vulnerability in leaking resources to the wrong area in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained
VAR-202111-0048 CVE-2021-25507 Samsung Flow mobile  Vulnerabilities in applications CVSS V2: 2.7
CVSS V3: 5.7
Severity: MEDIUM
Improper authorization vulnerability in Samsung Flow mobile application prior to 4.8.03.5 allows Samsung Flow PC application connected with user device to access part of notification data in Secure Folder without authorization. Samsung Flow mobile An unspecified vulnerability exists in the application.Information may be obtained
VAR-202111-0046 CVE-2021-25509 Samsung Flow Windows  Application validation vulnerability CVSS V2: 3.6
CVSS V3: 7.1
Severity: HIGH
A missing input validation in Samsung Flow Windows application prior to Version 4.8.5.0 allows attackers to overwrite abtraty file in the Windows known folders
VAR-202111-0006 CVE-2021-3774 Meross Smart Wi-Fi 2 Way Wall Switch  Vulnerability regarding lack of encryption of critical data in CVSS V2: 4.3
CVSS V3: 6.5
Severity: MEDIUM
Meross Smart Wi-Fi 2 Way Wall Switch (MSS550X), on its 3.1.3 version and before, creates an open Wi-Fi Access Point without the required security measures in its initial setup. This could allow a remote attacker to obtain the Wi-Fi SSID as well as the password configured by the user from Meross app via Http/JSON plain request
VAR-202111-0054 CVE-2021-25505 Samsung Pass  Authentication vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
Improper authentication in Samsung Pass prior to 3.0.02.4 allows to use app without authentication when lockscreen is unlocked. Samsung Pass There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Samsung Pass is a secure and simple way for Samsung to log in to websites and applications on mobile phones using biometric technology
VAR-202111-0133 CVE-2020-25368 D-Link DIR-823G  On the device  OS  Command injection vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A command injection vulnerability was discovered in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the PrivateLogin field to Login. D-Link DIR-823G On the device OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-823G is an AC1200M dual-band Gigabit wireless router
VAR-202111-0422 CVE-2020-25366 D-Link DIR-823G  Vulnerability regarding lack of authentication in CVSS V2: 8.5
CVSS V3: 9.1
Severity: CRITICAL
An issue in the component /cgi-bin/upload_firmware.cgi of D-Link DIR-823G REVA1 1.02B05 allows attackers to cause a denial of service (DoS) via unspecified vectors. D-Link DIR-823G Exists in a vulnerability related to the lack of authentication.Information is tampered with and service operation is interrupted (DoS) It may be in a state. D-Link DIR-823G is an AC1200M dual-band Gigabit wireless router. The /cgi-bin/upload_firmware.cgi component in D-Link DIR-823G version 1.02B05 has a denial of service vulnerability
VAR-202111-0245 CVE-2020-25367 D-Link DIR-823G  in the device firmware  OS  Command injection vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A command injection vulnerability was discovered in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the Captcha field to Login. (DoS) It may be in a state. D-Link DIR-823G is an AC1200M dual-band gigabit wireless router
VAR-202111-1856 No CVE Xiaomi Mi WiFi has an arbitrary file reading vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Xiaomi Technology Co., Ltd. was established on March 3, 2010. It is a global mobile Internet company focusing on the research and development of smart hardware and electronic products. It is also an innovation focusing on the construction of high-end smart phones, Internet TVs and smart home ecological chains. Type technology enterprise. Xiaomi Mi WiFi has arbitrary file reading vulnerabilities. Attackers can use this vulnerability to obtain sensitive information.
VAR-202111-1435 CVE-2021-39976 CloudEngine 5800  Vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
There is a privilege escalation vulnerability in CloudEngine 5800 V200R020C00SPC600. Due to lack of privilege restrictions, an authenticated local attacker can perform specific operation to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. CloudEngine 5800 Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Cloudengine 5800 is a 5800 series data center switch of China's Huawei (Huawei) company. Huawei Cloudengine 5800 has vulnerabilities in permissions and access control issues. This vulnerability stems from the lack of permission restrictions
VAR-202111-0413 CVE-2021-40120 plural  Cisco Small Business RV  series router   In  OS  Command injection vulnerability CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system and execute them using root-level privileges. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as a user with root-level privileges. (DoS) It may be in a state. Cisco Small Business RV Series Routers is an RV series router from Cisco (Cisco) in the United States
VAR-202111-0664 CVE-2021-40119 Cisco Policy Suite  Vulnerability in using hard-coded credentials in CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system as the root user. This vulnerability is due to the re-use of static SSH keys across installations. An attacker could exploit this vulnerability by extracting a key from a system under their control. A successful exploit could allow the attacker to log in to an affected system as the root user. Cisco Policy Suite Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202111-0419 CVE-2021-34773 plural  Cisco Unified Communications Manager  Cross-site request forgery vulnerability in product CVSS V2: 4.3
CVSS V3: 6.5
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. These actions could include modifying the device configuration and deleting (but not creating) user accounts. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution. Attackers can use this vulnerability to send unexpected requests to the server
VAR-202111-0417 CVE-2021-34784 Cisco Prime Infrastructure  and  Cisco Evolved Programmable Network Manager  Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information
VAR-202111-0421 CVE-2021-34701 plural  Cisco  Past traversal vulnerabilities in products CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity Connection could allow an authenticated, remote attacker to access sensitive data on an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the affected system. plural Cisco The product contains a path traversal vulnerability.Information may be obtained
VAR-202111-0412 CVE-2021-40124 Windows  for  Cisco AnyConnect Secure Mobility Client  Vulnerability in privilege management in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A vulnerability in the Network Access Manager (NAM) module of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to incorrect privilege assignment to scripts executed before user logon. An attacker could exploit this vulnerability by configuring a script to be executed before logon. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges. (DoS) It may be in a state. Cisco Anyconnect Secure Mobility Client is a VPN client software for secure connection from Cisco
VAR-202111-0400 CVE-2021-40128 Cisco Webex Meetings Security hole CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A vulnerability in the account activation feature of Cisco Webex Meetings could allow an unauthenticated, remote attacker to send an account activation email with an activation link that points to an arbitrary domain. This vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by sending a crafted HTTP request to the account activation page of Cisco Webex Meetings. A successful exploit could allow the attacker to send to any recipient an account activation email that contains a tampered activation link, which could direct the user to an attacker-controlled website. Cisco Webex Meetings is a set of video conferencing solutions of Cisco (Cisco)