VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202110-1687 CVE-2021-40449 plural  Microsoft Windows  Elevated authority vulnerabilities in products CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Win32k Elevation of Privilege Vulnerability. plural Microsoft Windows The product has Win32k There is a vulnerability that can elevate privileges due to a flaw in. Microsoft Win32k是美国微软(Microsoft)公司的一个用于Windows多用户管理的系统文件. Microsoft Windows Win32K存在缓冲区错误漏洞。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows 10 Version 1909 for 32-bit Systems,Windows 10 Version 1909 for x64-based Systems,Windows 10 Version 1909 for ARM64-based Systems,Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows Server 2022,Windows Server 2022 (Server Core installation),Windows 10 Version 2004 for 32-bit Systems,Windows 10 Version 2004 for ARM64-based Systems,Windows 10 Version 2004 for x64-based Systems,Windows Server, version 2004 (Server Core installation),Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 11 for x64-based Systems,Windows 11 for ARM64-based Systems,Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack 1,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation)
VAR-202111-1276 CVE-2021-37102 FusionCompute  Command injection vulnerabilities in the product CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
There is a command injection vulnerability in CMA service module of FusionCompute product when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system. Affected product versions include: FusionCompute 6.0.0, 6.3.0, 6.3.1, 6.5.0, 6.5.1, 8.0.0. (DoS) It may be in a state
VAR-202110-0078 CVE-2021-20122 Telus Wi-Fi Hub Command injection vulnerability CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
The Telus Wi-Fi Hub (PRV65B444A-S-TS) with firmware version 3.00.20 is affected by an authenticated command injection vulnerability in multiple parameters passed to tr69_cmd.cgi. A remote attacker connected to the router's LAN and authenticated with a super user account, or using a bypass authentication vulnerability like CVE-2021-20090 could leverage this issue to run commands or gain a shell as root on the target device
VAR-202110-1302 CVE-2021-37122 Huawei CloudEngine Resource Management Error Vulnerability CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
There is a use-after-free (UAF) vulnerability in Huawei products. An attacker may craft specific packets to exploit this vulnerability. Successful exploitation may cause the service abnormal. Affected product versions include:CloudEngine 12800 V200R005C10SPC800,V200R019C00SPC800;CloudEngine 5800 V200R005C10SPC800,V200R019C00SPC800;CloudEngine 6800 V200R005C10SPC800,V200R005C20SPC800,V200R019C00SPC800;CloudEngine 7800 V200R005C10SPC800,V200R019C00SPC800. plural Huawei The product contains a usage of freed memory vulnerability.Service operation interruption (DoS) It may be in a state. Huawei CloudEngine is a data center switch of China's Huawei (Huawei) company. Huawei CloudEngine has a resource management error vulnerability
VAR-202110-0676 CVE-2021-36767 Digi RealPort  Vulnerability related to the use of insufficiently strong password hashes in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server. Digi RealPort contains a vulnerability related to the use of insufficiently strong password hashes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202110-1912 No CVE Huawei Technologies Co., Ltd. SRG3260 has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Huawei Technologies Co., Ltd. is the world's leading provider of information and communication technology (ICT) solutions, focusing on the ICT field. Huawei Technologies Co., Ltd. SRG3260 has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202110-0147 CVE-2021-35977 Windows  for  Digi RealPort  Classic buffer overflow vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered in Digi RealPort for Windows through 4.8.488.0. A buffer overflow exists in the handling of ADDP discovery response messages. This could result in arbitrary code execution. Windows for Digi RealPort Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202110-0148 CVE-2021-35979 Digi RealPort  Vulnerability regarding lack of authentication for critical features in CVSS V2: 6.8
CVSS V3: 8.1
Severity: HIGH
An issue was discovered in Digi RealPort through 4.8.488.0. The 'encrypted' mode is vulnerable to man-in-the-middle attacks and does not perform authentication. Digi RealPort There is a vulnerability in the lack of authentication for critical features.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202110-1301 CVE-2021-37124 Huawei PC Smart Full Scene  and  PCManager  Past traversal vulnerability in CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
There is a path traversal vulnerability in Huawei PC product. Because the product does not filter path with special characters,attackers can construct a file path with special characters to exploit this vulnerability. Successful exploitation could allow the attacker to transport a file to certain path.Affected product versions include:PC Smart Full Scene 11.1 versions PCManager 11.1.1.97. Huawei PC Smart Full Scene and PCManager Exists in a past traversal vulnerability.Information may be tampered with
VAR-202110-0966 CVE-2021-38462 InHand Networks IR615 Router  Vulnerability in requesting weak passwords in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf. InHand Networks IR615 Router contains a weak password requirement vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Ruimu Technology IR615 Router is a 4G industrial router of China Ruimu Technology Company. IR615 Router has a security vulnerability
VAR-202110-0995 CVE-2021-38426 FATEK Automation WinProladder  Out-of-bounds write vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code. FATEK Automation WinProladder Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDW files. FATEK Automation WinProladder is a PLC of China FATEK Automation company
VAR-202110-0957 CVE-2021-38482 InHand Networks IR615 Router  Cross-site scripting vulnerability in CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 website used to control the router is vulnerable to stored cross-site scripting, which may allow an attacker to hijack sessions of users connected to the system. InHand Networks IR615 Router Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Ruimu Technology IR615 Router is a 4G industrial router of China Ruimu Technology Company
VAR-202110-1635 CVE-2021-37726 Aruba Instant  Classic buffer overflow vulnerability in CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A remote buffer overflow vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 8.7.x.x: 8.7.0.0 through 8.7.1.2. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability. Aruba Instant Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Provides the only Wi-Fi solution that is easy to set up. A remote attacker can use this vulnerability to execute arbitrary code on the target system
VAR-202110-0991 CVE-2021-38438 FATEK Automation WinProladder Resource Management Error Vulnerability CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
A use after free vulnerability in FATEK Automation WinProladder versions 3.30 and prior may be exploited when a valid user opens a malformed project file, which may allow arbitrary code execution. FATEK Automation WinProladder Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fatek Automation WinProladder. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDW files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. FATEK Automation WinProladder is a PLC of China FATEK Automation company
VAR-202110-0956 CVE-2021-38484 InHand Networks IR615 Router  Vulnerability in unlimited upload of dangerous types of files in CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution. InHand Networks IR615 Router Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Ruimu Technology IR615 Router is a 4G industrial router of China Ruimu Technology Company
VAR-202110-0992 CVE-2021-38436 FATEK Automation WinProladder  Buffer error vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a memory-corruption condition. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. FATEK Automation WinProladder Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. FATEK Automation WinProladder is a PLC of China FATEK Automation Company
VAR-202110-1633 CVE-2021-37730 Aruba Instant operating system command injection vulnerability CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability. HPE Aruba Instant (IAP) for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Provides the only Wi-Fi solution that is easy to set up. Remotely authenticated attackers can use this vulnerability to upgrade privileges on the system
VAR-202110-0443 CVE-2021-38478 InHand Networks IR615 Router  In  OS  Command injection vulnerability CVSS V2: 6.5
CVSS V3: 9.1
Severity: CRITICAL
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a traceroute tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device. InHand Networks IR615 Router for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Ruimu Technology IR615 Router is a 4G industrial router of China Ruimu Technology Company. IR615 Router has operating system command injection vulnerability
VAR-202110-0993 CVE-2021-38434 FATEK Automation WinProladder  Unexpected sign extension vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an unexpected sign extension. An attacker could leverage this vulnerability to execute arbitrary code. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDW files. An unexpected sign extension can result in a write outside the bounds of an allocated buffer. FATEK Automation WinProladder is a PLC of China FATEK Automation Company
VAR-202110-0960 CVE-2021-38474 InHand Networks IR615 Router  Vulnerability in improperly limiting excessive authentication attempts in CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have has no account lockout policy configured for the login page of the product. This may allow an attacker to execute a brute-force password attack with no time limitation and without harming the normal operation of the user. This could allow an attacker to gain valid credentials for the product interface. InHand Networks IR615 Router Is vulnerable to improper restrictions on excessive authentication attempts.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Ruimu Technology IR615 Router is a 4G industrial router of China Ruimu Technology Company