VARIoT IoT vulnerabilities database

VAR-202012-0322 | CVE-2020-24677 | S+ Operations and S+ Historian web applications Vulnerability in checking for exceptional conditions in |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Vulnerabilities in the S+ Operations and S+ Historian web applications can lead to a possible code execution and privilege escalation, redirect the user somewhere else or download unwanted data. Both ABB Symphony Plus Operations and ABB Symphony Plus Historian are products of ABB, Switzerland. ABB Symphony Plus Operations is a management device used in industrial environments to improve operational efficiency. The device provides an easy-to-use human-machine interface, seamlessly integrates all plant equipment and subsystems using industry-standard protocols and technologies, and provides functions such as alarm management, process optimization, and more. ABB Symphony Plus Historian is a device for visually viewing and managing historical information of industrial equipment
VAR-202012-0321 | CVE-2020-24676 | Symphony Plus Operations and Symphony Plus Historian Vulnerability in privilege management |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
In Symphony Plus Operations and Symphony Plus Historian, some services can be vulnerable to privilege escalation attacks. An unprivileged (but authenticated) user could execute arbitrary code and result in privilege escalation, depending on the user that the service runs as. ABB Symphony Plus Operations is a management device used in industrial environments to improve operational efficiency. The device provides an easy-to-use human-machine interface, seamlessly integrates all plant equipment and subsystems using industry-standard protocols and technologies, and provides functions such as alarm management, process optimization, and more. ABB Symphony Plus Historian is a device for visually viewing and managing historical information of industrial equipment
VAR-202012-0320 | CVE-2020-24675 | S+ Operations and S+ History Authentication vulnerabilities in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
In S+ Operations and S+ History, it is possible that an unauthenticated user could inject values to the Operations History server (or standalone S+ History server) and ultimately write values to the controlled process. S+ Operations and S+ History Contains an authentication vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Both ABB Symphony Plus Operations and ABB Symphony Plus Historian are products of ABB, Switzerland. ABB Symphony Plus Operations is a management device used in industrial environments to improve operational efficiency. The device provides an easy-to-use human-machine interface, seamlessly integrates all plant equipment and subsystems using industry-standard protocols and technologies, and provides functions such as alarm management, process optimization, and more. ABB Symphony Plus Historian is a device for visually viewing and managing historical information of industrial equipment
VAR-202012-0319 | CVE-2020-24674 | S+ Operations and S+ Historian Authentication Vulnerability in Microsoft |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
In S+ Operations and S+ Historian, not all client commands correctly check user permission as expected. Authenticated but Unauthorized remote users could execute a Denial-of-Service (DoS) attack, execute arbitrary code, or obtain more privilege than intended on the machines. S+ Operations and S+ Historian Contains an improper authentication vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Both ABB Symphony Plus Operations and ABB Symphony Plus Historian are products of ABB, Switzerland. ABB Symphony Plus Operations is a management device used in industrial environments to improve operational efficiency. The device provides an easy-to-use human-machine interface, seamlessly integrates all plant equipment and subsystems using industry-standard protocols and technologies, and provides functions such as alarm management, process optimization, and more. ABB Symphony Plus Historian is a device for visually viewing and managing historical information of industrial equipment
VAR-202012-0318 | CVE-2020-24673 | S+ Operations and S+ Historian In SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability. S+ Operations and S+ Historian Has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Both ABB Symphony Plus Operations and ABB Symphony Plus Historian are products of ABB, Switzerland. ABB Symphony Plus Operations is a management device used in industrial environments to improve operational efficiency. The device provides an easy-to-use human-machine interface, seamlessly integrates all plant equipment and subsystems using industry-standard protocols and technologies, and provides functions such as alarm management, process optimization, and more. ABB Symphony Plus Historian is a device for visually viewing and managing historical information of industrial equipment
VAR-202102-0338 | CVE-2020-27867 | plural NETGEAR Command injection vulnerabilities in the product |
CVSS V2: 7.7 CVSS V3: 6.8 Severity: MEDIUM |
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11653. plural NETGEAR The product contains a command injection vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-11653 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202012-1580 | No CVE | LTE digital cellular mobile communication network MME equipment has a denial of service vulnerability (CNVD-2020-67628) |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
LTE digital cellular mobile communication network MME equipment is an important network element of the LTE core network and is responsible for processing signaling.
LTE digital cellular mobile communication network MME equipment has a denial of service vulnerability. An attacker can exploit the vulnerability to cause a denial of service attack.
VAR-202012-1619 | No CVE | The UPS management module of Xiamen Kehua Hengsheng Co., Ltd. has a logic defect vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Xiamen Kehua Hengsheng Co., Ltd. is the world's leading provider of ICT (information and communication) infrastructure and smart terminals.
The UPS management module of Xiamen Kehua Hengsheng Co., Ltd. has a logic flaw vulnerability. Attackers can use this vulnerability to use a specially constructed Cookie value to bypass verification and inherit the permissions of the last logged-in user to directly access the management module.
VAR-202012-1620 | No CVE | LeTV Super 4x43 TV has remote code execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
In September 2013, Le Rong Zhixin Electronic Technology (Beijing) Co., Ltd., the company's business scope includes: technology promotion, technology development, technology consulting, technical services, etc.
LeTV Super 4 x43 TV has a remote code execution vulnerability. Attackers can use this vulnerability to execute arbitrary code.
VAR-202012-1441 | CVE-2020-6882 | plural ZTE Vulnerability in using hard-coded credentials in routers |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
ZTE E8810/E8820/E8822 series routers have an information leak vulnerability, which is caused by hard-coded MQTT service access credentials on the device. The remote attacker could use this credential to connect to the MQTT server, so as to obtain information about other devices by sending specific topics. This affects:<ZXHN E8810, ZXHN E8820, ZXHN E8822><E8810 V1.0.26, E8810 V2.0.1, E8820 V1.1.3L, E8820 V2.0.13, E8822 V2.0.13>. ZTE E8810 is an intelligent cloud router of China ZTE Corporation.
ZTE E8810 has a hard-coded vulnerability in the MQTT service
VAR-202012-1268 | CVE-2018-7580 |
Philips Hue Vulnerability in
Related entries in the VARIoT exploits database: VAR-E-202012-0027 |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Philips Hue is vulnerable to a Denial of Service attack. Sending a SYN flood on port tcp/80 will freeze Philips Hue's hub and it will stop responding. The "hub" will stop operating and be frozen until the flood stops. During the flood, the user won't be able to turn on/off the lights, and all of the hub's functionality will be unresponsive. The cloud service also won't work with the hub
VAR-202101-0555 | CVE-2020-35170 | plural Dell EMC Cross-site scripting vulnerabilities in products |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Dell EMC Unisphere for PowerMax versions prior to 9.1.0.9, Dell EMC Unisphere for PowerMax versions prior to 9.0.2.16, and Dell EMC PowerMax OS 5978.221.221 and 5978.479.479 contain a Cross-Site Scripting (XSS) vulnerability. An authenticated malicious user may potentially exploit this vulnerability to inject javascript code and affect other authenticated users’ sessions. DELL Dell EMC Unisphere for PowerMax is a set of graphical management tools for PowerMax storage arrays developed by Dell (DELL)
VAR-202102-0337 | CVE-2020-27866 | plural NETGEAR Product authentication vulnerabilities |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11355. Zero Day Initiative To this vulnerability ZDI-CAN-11355 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202012-0715 | CVE-2020-27687 | Thingsboard injection vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
ThingsBoard before v3.2 is vulnerable to Host header injection in password-reset emails. This allows an attacker to send malicious links in password-reset emails to victims, pointing to an attacker-controlled server. Lack of validation of the Host header allows this to happen. ThingsBoard There are injection vulnerabilities and input verification vulnerabilities.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Thingsboard is a Java-based platform of Thingsboard team for IOT equipment monitoring, management, and data collection
VAR-202012-1269 | CVE-2020-4080 | HCL Verse Cross-site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
HCL Verse v10 and v11 is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability due to improper handling of message content. An unauthenticated remote attacker could exploit this vulnerability using specially-crafted markup to execute script in a victim's web browser within the security context of the hosting Web site and/or steal the victim's cookie-based authentication credentials
VAR-202012-0270 | CVE-2020-20277 | uftpd FTP Path traversal vulnerability in server |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
There are multiple unauthenticated directory traversal vulnerabilities in different FTP commands in uftpd FTP server versions 2.7 to 2.10 due to improper implementation of a chroot jail in common.c's compose_abspath function that can be abused to read or write to arbitrary files on the filesystem, leak process memory, or potentially lead to remote code execution. uftpd FTP A path traversal vulnerability exists in the server.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202012-0269 | CVE-2020-20276 | uftpd FTP Out-of-bounds write vulnerability in server |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An unauthenticated stack-based buffer overflow vulnerability in common.c's handle_PORT in uftpd FTP server versions 2.10 and earlier can be abused to cause a crash and could potentially lead to remote code execution. uftpd FTP The server is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202012-0718 | CVE-2020-27715 | plural F5 Networks Product vulnerabilities |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP 15.1.0-15.1.0.5 and 14.1.0-14.1.3, crafted TLS request to the BIG-IP management interface via port 443 can cause high (~100%) CPU utilization by the httpd daemon. BIG-IP Access Policy Manager (APM) , BIG-IP Advanced Firewall Manager (AFM) , BIG-IP Analytics etc. multiple F5 Networks There are unspecified vulnerabilities in the product.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. There is a security vulnerability in F5 BIG-IP. Attackers can use this vulnerability to request F5 BIG-IP through the configuration tool TLS to trigger overload and trigger denial of service
VAR-202012-0717 | CVE-2020-27714 | F5 Networks of BIG-IP Advanced Firewall Manager (AFM) Vulnerability in |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
On the BIG-IP AFM version 15.1.0-15.1.0.5, 14.1.0-14.1.3, and 13.1.0-13.1.3.5, when a Protocol Inspection Profile is attached to a FastL4 virtual server with the protocol field configured to either Other or All Protocols, the TMM may experience a restart if the profile processes non-TCP traffic. F5 Networks of BIG-IP Advanced Firewall Manager (AFM) Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. A security vulnerability exists in the F5 BIG-IP AFM that could allow an attacker to trigger a denial of service by triggering a fatal error in a protocol inspection configuration file. The following products and versions are affected: 15.1.0-15.1.0.5, 14.1.0-14.1.3, and 13.1.0-13.1.3.5
VAR-202012-0726 | CVE-2020-27719 | plural F5 Networks Cross-site scripting vulnerability in the product |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
On BIG-IP 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.3, a cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility. BIG-IP Access Policy Manager (APM) , BIG-IP Advanced Firewall Manager (AFM) , BIG-IP Advanced Web Application Firewall (WAF) etc. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5