VARIoT IoT vulnerabilities database
| VAR-202111-1764 | CVE-2021-39967 | plural Huawei Improper Default Permission Vulnerability in Smartphone Products |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei A vulnerability related to improper default permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a sensitive information disclosure vulnerability in the Huawei HarmonyOS SIM dual card management component. An attacker could exploit this vulnerability to compromise confidentiality
| VAR-202111-1763 | CVE-2021-37118 | HarmonyOS Vulnerability in handling exceptional conditions in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
The HwNearbyMain module has a Improper Handling of Exceptional Conditions vulnerability.Successful exploitation of this vulnerability may lead to message leak. HarmonyOS Exists in a vulnerability in handling exceptional conditions.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS Vision HwNearbyMain. An attacker could exploit this vulnerability to compromise confidentiality
| VAR-202111-1769 | CVE-2021-39974 | plural Huawei Out-of-bounds reading vulnerability in smartphone products |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained
| VAR-202111-1767 | CVE-2021-37133 | HarmonyOS Vulnerability in leaking resources to the wrong area in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained
| VAR-202111-0048 | CVE-2021-25507 | Samsung Flow mobile Vulnerabilities in applications |
CVSS V2: 2.7 CVSS V3: 5.7 Severity: MEDIUM |
Improper authorization vulnerability in Samsung Flow mobile application prior to 4.8.03.5 allows Samsung Flow PC application connected with user device to access part of notification data in Secure Folder without authorization. Samsung Flow mobile An unspecified vulnerability exists in the application.Information may be obtained
| VAR-202111-0046 | CVE-2021-25509 | Samsung Flow Windows Application validation vulnerability |
CVSS V2: 3.6 CVSS V3: 7.1 Severity: HIGH |
A missing input validation in Samsung Flow Windows application prior to Version 4.8.5.0 allows attackers to overwrite abtraty file in the Windows known folders
| VAR-202111-0006 | CVE-2021-3774 | Meross Smart Wi-Fi 2 Way Wall Switch Vulnerability regarding lack of encryption of critical data in |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
Meross Smart Wi-Fi 2 Way Wall Switch (MSS550X), on its 3.1.3 version and before, creates an open Wi-Fi Access Point without the required security measures in its initial setup. This could allow a remote attacker to obtain the Wi-Fi SSID as well as the password configured by the user from Meross app via Http/JSON plain request
| VAR-202111-0054 | CVE-2021-25505 | Samsung Pass Authentication vulnerability in |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Improper authentication in Samsung Pass prior to 3.0.02.4 allows to use app without authentication when lockscreen is unlocked. Samsung Pass There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Samsung Pass is a secure and simple way for Samsung to log in to websites and applications on mobile phones using biometric technology
| VAR-202111-0133 | CVE-2020-25368 | D-Link DIR-823G On the device OS Command injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A command injection vulnerability was discovered in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the PrivateLogin field to Login. D-Link DIR-823G On the device OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-823G is an AC1200M dual-band Gigabit wireless router
| VAR-202111-0422 | CVE-2020-25366 | D-Link DIR-823G Vulnerability regarding lack of authentication in |
CVSS V2: 8.5 CVSS V3: 9.1 Severity: CRITICAL |
An issue in the component /cgi-bin/upload_firmware.cgi of D-Link DIR-823G REVA1 1.02B05 allows attackers to cause a denial of service (DoS) via unspecified vectors. D-Link DIR-823G Exists in a vulnerability related to the lack of authentication.Information is tampered with and service operation is interrupted (DoS) It may be in a state. D-Link DIR-823G is an AC1200M dual-band Gigabit wireless router.
The /cgi-bin/upload_firmware.cgi component in D-Link DIR-823G version 1.02B05 has a denial of service vulnerability
| VAR-202111-0245 | CVE-2020-25367 | D-Link DIR-823G in the device firmware OS Command injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A command injection vulnerability was discovered in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the Captcha field to Login. (DoS) It may be in a state. D-Link DIR-823G is an AC1200M dual-band gigabit wireless router
| VAR-202111-1856 | No CVE | Xiaomi Mi WiFi has an arbitrary file reading vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Xiaomi Technology Co., Ltd. was established on March 3, 2010. It is a global mobile Internet company focusing on the research and development of smart hardware and electronic products. It is also an innovation focusing on the construction of high-end smart phones, Internet TVs and smart home ecological chains. Type technology enterprise.
Xiaomi Mi WiFi has arbitrary file reading vulnerabilities. Attackers can use this vulnerability to obtain sensitive information.
| VAR-202111-1435 | CVE-2021-39976 | CloudEngine 5800 Vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
There is a privilege escalation vulnerability in CloudEngine 5800 V200R020C00SPC600. Due to lack of privilege restrictions, an authenticated local attacker can perform specific operation to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. CloudEngine 5800 Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Cloudengine 5800 is a 5800 series data center switch of China's Huawei (Huawei) company.
Huawei Cloudengine 5800 has vulnerabilities in permissions and access control issues. This vulnerability stems from the lack of permission restrictions
| VAR-202111-0413 | CVE-2021-40120 | plural Cisco Small Business RV series router In OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system and execute them using root-level privileges. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as a user with root-level privileges. (DoS) It may be in a state. Cisco Small Business RV Series Routers is an RV series router from Cisco (Cisco) in the United States
| VAR-202111-0664 | CVE-2021-40119 | Cisco Policy Suite Vulnerability in using hard-coded credentials in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system as the root user. This vulnerability is due to the re-use of static SSH keys across installations. An attacker could exploit this vulnerability by extracting a key from a system under their control. A successful exploit could allow the attacker to log in to an affected system as the root user. Cisco Policy Suite Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202111-0419 | CVE-2021-34773 | plural Cisco Unified Communications Manager Cross-site request forgery vulnerability in product |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. These actions could include modifying the device configuration and deleting (but not creating) user accounts. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution. Attackers can use this vulnerability to send unexpected requests to the server
| VAR-202111-0417 | CVE-2021-34784 | Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information
| VAR-202111-0421 | CVE-2021-34701 | plural Cisco Past traversal vulnerabilities in products |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity Connection could allow an authenticated, remote attacker to access sensitive data on an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the affected system. plural Cisco The product contains a path traversal vulnerability.Information may be obtained
| VAR-202111-0412 | CVE-2021-40124 | Windows for Cisco AnyConnect Secure Mobility Client Vulnerability in privilege management in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in the Network Access Manager (NAM) module of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to incorrect privilege assignment to scripts executed before user logon. An attacker could exploit this vulnerability by configuring a script to be executed before logon. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges. (DoS) It may be in a state. Cisco Anyconnect Secure Mobility Client is a VPN client software for secure connection from Cisco
| VAR-202111-0400 | CVE-2021-40128 | Cisco Webex Meetings Security hole |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the account activation feature of Cisco Webex Meetings could allow an unauthenticated, remote attacker to send an account activation email with an activation link that points to an arbitrary domain. This vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by sending a crafted HTTP request to the account activation page of Cisco Webex Meetings. A successful exploit could allow the attacker to send to any recipient an account activation email that contains a tampered activation link, which could direct the user to an attacker-controlled website. Cisco Webex Meetings is a set of video conferencing solutions of Cisco (Cisco)