VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202110-0173 CVE-2021-25493 Samsung Notes libSPenBase Buffer Overflow Vulnerability (CNVD-2025-24720) CVSS V2: 3.6
CVSS V3: 7.1
Severity: HIGH
Lack of boundary checking of a buffer in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows OOB read. Samsung Notes is an application developed by Samsung in South Korea. It provides a note-taking function
VAR-202110-0174 CVE-2021-25494 Samsung Notes Buffer error vulnerability CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
A possible buffer overflow vulnerability in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows arbitrary code execution
VAR-202110-0172 CVE-2021-25492 Samsung Notes Buffer error vulnerability CVSS V2: 3.6
CVSS V3: 7.1
Severity: HIGH
Lack of boundary checking of a buffer in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows OOB read
VAR-202110-0201 CVE-2021-34711 Cisco IP Phone Path traversal vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted input to a debug shell command. A successful exploit could allow the attacker to read any file on the device file system
VAR-202110-0188 CVE-2021-25473 Samsung SystemUI Denial of Service Vulnerability CVSS V2: 4.9
CVSS V3: 4.4
Severity: MEDIUM
Assuming a shell privilege is gained, an improper exception handling for multi_sim_bar_hide_by_meadia_full value in SystemUI prior to SMR Oct-2021 Release 1 allows an attacker to cause a permanent denial of service in user device before factory reset. Samsung SystemUI is a system application for Samsung mobile devices. There is a denial of service vulnerability in Samsung SystemUI. The vulnerability originates from an incorrect handling of the multi_sim_bar_hide_by_meadia_full exception in SystemUI. Attackers can exploit this vulnerability to cause a denial of service before the device is restored to factory settings
VAR-202110-0159 CVE-2021-25479 Samsung LTE RRC Buffer Overflow Vulnerability CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
A possible heap-based buffer overflow vulnerability in Exynos CP Chipset prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution. Samsung LTE RRC is a protocol in Samsung mobile devices. The RRC word layer has many functions, including the broadcast of non-access stratum (NAS) related system information, the broadcast of access stratum (AS) related system information, and paging , establishing, maintaining and releasing the RRC connection between the UE and the E-UTRAN
VAR-202110-0240 CVE-2021-34702 Cisco Identity Services Engine Security hole CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information. This vulnerability is due to improper enforcement of administrator privilege levels for low-value sensitive data. An attacker with read-only administrator access to the web-based management interface could exploit this vulnerability by browsing to the page that contains the sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system
VAR-202110-0075 CVE-2021-20489 BM Sterling File Gateway  Cross-site request forgery vulnerability in CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 197790. Vendor exploits this vulnerability IBM X-Force ID: 197790 It is published as.Information may be obtained and information may be tampered with
VAR-202110-0199 CVE-2021-34706 Cisco Identity Services Engine Code problem vulnerability CVSS V2: 5.5
CVSS V3: 5.4
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to access sensitive information or conduct a server-side request forgery (SSRF) attack through an affected device. This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by uploading a crafted XML file that contains references to external entities. A successful exploit could allow the attacker to retrieve files from the local system, resulting in the disclosure of sensitive information, or cause the web application to perform arbitrary HTTP requests on behalf of the attacker
VAR-202110-0073 CVE-2021-20473 IBM Sterling File Gateway  Session deadline vulnerability in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
IBM Sterling File Gateway User Interface 2.2.0.0 through 6.1.1.0 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 196944. Vendor exploits this vulnerability IBM X-Force ID: 196944 It is published as.Information may be obtained and information may be tampered with
VAR-202110-0074 CVE-2021-20481 IBM Sterling File Gateway   Cross-site scripting vulnerability in CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 197503. Vendor exploits this vulnerability IBM X-Force ID: 197503 It is published as.Information may be obtained and information may be tampered with
VAR-202110-0093 CVE-2021-1594 Cisco Identity Services Engine Operating system command injection vulnerability CVSS V2: 9.3
CVSS V3: 8.1
Severity: HIGH
A vulnerability in the REST API of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform a command injection attack and elevate privileges to root. This vulnerability is due to insufficient input validation for specific API endpoints. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting and modifying specific internode communications from one ISE persona to another ISE persona. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying operating system. To exploit this vulnerability, the attacker would need to decrypt HTTPS traffic between two ISE personas that are located on separate nodes
VAR-202110-0212 CVE-2021-34766 Cisco Smart Software Manager Security hole CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
A vulnerability in the web UI of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to elevate privileges and create, read, update, or delete records and settings in multiple functions. This vulnerability is due to insufficient authorization of the System User and System Operator role capabilities. An attacker could exploit this vulnerability by directly accessing a web resource. A successful exploit could allow the attacker to create, read, update, or delete records and settings in multiple functions without the necessary permissions on the web UI
VAR-202110-0209 CVE-2021-34748 Cisco Intersight Operating system command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A vulnerability in the web-based management interface of Cisco Intersight Virtual Appliance could allow an authenticated, remote attacker to perform a command injection attack on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using the web-based management interface to execute a command using crafted input. A successful exploit could allow the attacker to execute arbitrary commands using root-level privileges on an affected device
VAR-202110-0213 CVE-2021-34772 Cisco Orbital Input validation error vulnerability CVSS V2: 5.8
CVSS V3: 6.1
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Orbital could allow an unauthenticated, remote attacker to redirect users to a malicious webpage. This vulnerability is due to improper validation of URL paths in the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted URL. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability, known as an open redirect attack, is used in phishing attacks to persuade users to visit malicious sites
VAR-202110-0211 CVE-2021-34758 Cisco RoomOS Software and Cisco TelePresence Collaboration Endpoint Software Access control error vulnerability CVSS V2: 2.1
CVSS V3: 3.3
Severity: LOW
A vulnerability in the memory management of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an authenticated, local attacker to corrupt a shared memory segment, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient access controls to a shared memory resource. An attacker could exploit this vulnerability by corrupting a shared memory segment on an affected device. A successful exploit could allow the attacker to cause the device to reload. The device will recover from the corruption upon reboot
VAR-202110-0207 CVE-2021-34742 Cisco Vision Dynamic Signage Director Cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information
VAR-202110-0131 CVE-2021-24019 Fortinet FortiClientEms Code problem vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks). Fortinet FortiClientEms is a centralized central management system of Fortinet Corporation in the United States
VAR-202110-0203 CVE-2021-34782 Cisco DNA Center Security hole CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability in the API endpoints for Cisco DNA Center could allow an authenticated, remote attacker to gain access to sensitive information that should be restricted. The attacker must have valid device credentials. This vulnerability is due to improper access controls on API endpoints. An attacker could exploit the vulnerability by sending a specific API request to an affected application. A successful exploit could allow the attacker to obtain sensitive information about other users who are configured with higher privileges on the application
VAR-202110-0014 CVE-2020-15941 Fortinet FortiClientEms Path traversal vulnerability CVSS V2: 5.5
CVSS V3: 5.4
Severity: MEDIUM
A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages