VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202012-0322 CVE-2020-24677 S+ Operations  and  S+ Historian web applications  Vulnerability in checking for exceptional conditions in CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Vulnerabilities in the S+ Operations and S+ Historian web applications can lead to a possible code execution and privilege escalation, redirect the user somewhere else or download unwanted data. Both ABB Symphony Plus Operations and ABB Symphony Plus Historian are products of ABB, Switzerland. ABB Symphony Plus Operations is a management device used in industrial environments to improve operational efficiency. The device provides an easy-to-use human-machine interface, seamlessly integrates all plant equipment and subsystems using industry-standard protocols and technologies, and provides functions such as alarm management, process optimization, and more. ABB Symphony Plus Historian is a device for visually viewing and managing historical information of industrial equipment
VAR-202012-0321 CVE-2020-24676 Symphony Plus Operations  and  Symphony Plus Historian  Vulnerability in privilege management CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
In Symphony Plus Operations and Symphony Plus Historian, some services can be vulnerable to privilege escalation attacks. An unprivileged (but authenticated) user could execute arbitrary code and result in privilege escalation, depending on the user that the service runs as. ABB Symphony Plus Operations is a management device used in industrial environments to improve operational efficiency. The device provides an easy-to-use human-machine interface, seamlessly integrates all plant equipment and subsystems using industry-standard protocols and technologies, and provides functions such as alarm management, process optimization, and more. ABB Symphony Plus Historian is a device for visually viewing and managing historical information of industrial equipment
VAR-202012-0320 CVE-2020-24675 S+ Operations  and  S+ History  Authentication vulnerabilities in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
In S+ Operations and S+ History, it is possible that an unauthenticated user could inject values to the Operations History server (or standalone S+ History server) and ultimately write values to the controlled process. S+ Operations and S+ History Contains an authentication vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Both ABB Symphony Plus Operations and ABB Symphony Plus Historian are products of ABB, Switzerland. ABB Symphony Plus Operations is a management device used in industrial environments to improve operational efficiency. The device provides an easy-to-use human-machine interface, seamlessly integrates all plant equipment and subsystems using industry-standard protocols and technologies, and provides functions such as alarm management, process optimization, and more. ABB Symphony Plus Historian is a device for visually viewing and managing historical information of industrial equipment
VAR-202012-0319 CVE-2020-24674 S+ Operations  and  S+ Historian  Authentication Vulnerability in Microsoft CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
In S+ Operations and S+ Historian, not all client commands correctly check user permission as expected. Authenticated but Unauthorized remote users could execute a Denial-of-Service (DoS) attack, execute arbitrary code, or obtain more privilege than intended on the machines. S+ Operations and S+ Historian Contains an improper authentication vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Both ABB Symphony Plus Operations and ABB Symphony Plus Historian are products of ABB, Switzerland. ABB Symphony Plus Operations is a management device used in industrial environments to improve operational efficiency. The device provides an easy-to-use human-machine interface, seamlessly integrates all plant equipment and subsystems using industry-standard protocols and technologies, and provides functions such as alarm management, process optimization, and more. ABB Symphony Plus Historian is a device for visually viewing and managing historical information of industrial equipment
VAR-202012-0318 CVE-2020-24673 S+ Operations  and  S+ Historian  In  SQL  Injection vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability. S+ Operations and S+ Historian Has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Both ABB Symphony Plus Operations and ABB Symphony Plus Historian are products of ABB, Switzerland. ABB Symphony Plus Operations is a management device used in industrial environments to improve operational efficiency. The device provides an easy-to-use human-machine interface, seamlessly integrates all plant equipment and subsystems using industry-standard protocols and technologies, and provides functions such as alarm management, process optimization, and more. ABB Symphony Plus Historian is a device for visually viewing and managing historical information of industrial equipment
VAR-202102-0338 CVE-2020-27867 plural  NETGEAR  Command injection vulnerabilities in the product CVSS V2: 7.7
CVSS V3: 6.8
Severity: MEDIUM
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11653. plural NETGEAR The product contains a command injection vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-11653 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202012-1580 No CVE LTE digital cellular mobile communication network MME equipment has a denial of service vulnerability (CNVD-2020-67628) CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
LTE digital cellular mobile communication network MME equipment is an important network element of the LTE core network and is responsible for processing signaling. LTE digital cellular mobile communication network MME equipment has a denial of service vulnerability. An attacker can exploit the vulnerability to cause a denial of service attack.
VAR-202012-1619 No CVE The UPS management module of Xiamen Kehua Hengsheng Co., Ltd. has a logic defect vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Xiamen Kehua Hengsheng Co., Ltd. is the world's leading provider of ICT (information and communication) infrastructure and smart terminals. The UPS management module of Xiamen Kehua Hengsheng Co., Ltd. has a logic flaw vulnerability. Attackers can use this vulnerability to use a specially constructed Cookie value to bypass verification and inherit the permissions of the last logged-in user to directly access the management module.
VAR-202012-1620 No CVE LeTV Super 4x43 TV has remote code execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
In September 2013, Le Rong Zhixin Electronic Technology (Beijing) Co., Ltd., the company's business scope includes: technology promotion, technology development, technology consulting, technical services, etc. LeTV Super 4 x43 TV has a remote code execution vulnerability. Attackers can use this vulnerability to execute arbitrary code.
VAR-202012-1441 CVE-2020-6882 plural  ZTE  Vulnerability in using hard-coded credentials in routers CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
ZTE E8810/E8820/E8822 series routers have an information leak vulnerability, which is caused by hard-coded MQTT service access credentials on the device. The remote attacker could use this credential to connect to the MQTT server, so as to obtain information about other devices by sending specific topics. This affects:<ZXHN E8810, ZXHN E8820, ZXHN E8822><E8810 V1.0.26, E8810 V2.0.1, E8820 V1.1.3L, E8820 V2.0.13, E8822 V2.0.13>. ZTE E8810 is an intelligent cloud router of China ZTE Corporation. ZTE E8810 has a hard-coded vulnerability in the MQTT service
VAR-202012-1268 CVE-2018-7580 Philips Hue  Vulnerability in

Related entries in the VARIoT exploits database: VAR-E-202012-0027
CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Philips Hue is vulnerable to a Denial of Service attack. Sending a SYN flood on port tcp/80 will freeze Philips Hue's hub and it will stop responding. The "hub" will stop operating and be frozen until the flood stops. During the flood, the user won't be able to turn on/off the lights, and all of the hub's functionality will be unresponsive. The cloud service also won't work with the hub
VAR-202101-0555 CVE-2020-35170 plural  Dell EMC  Cross-site scripting vulnerabilities in products CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Dell EMC Unisphere for PowerMax versions prior to 9.1.0.9, Dell EMC Unisphere for PowerMax versions prior to 9.0.2.16, and Dell EMC PowerMax OS 5978.221.221 and 5978.479.479 contain a Cross-Site Scripting (XSS) vulnerability. An authenticated malicious user may potentially exploit this vulnerability to inject javascript code and affect other authenticated users’ sessions. DELL Dell EMC Unisphere for PowerMax is a set of graphical management tools for PowerMax storage arrays developed by Dell (DELL)
VAR-202102-0337 CVE-2020-27866 plural  NETGEAR  Product authentication vulnerabilities CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11355. Zero Day Initiative To this vulnerability ZDI-CAN-11355 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202012-0715 CVE-2020-27687 Thingsboard injection vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
ThingsBoard before v3.2 is vulnerable to Host header injection in password-reset emails. This allows an attacker to send malicious links in password-reset emails to victims, pointing to an attacker-controlled server. Lack of validation of the Host header allows this to happen. ThingsBoard There are injection vulnerabilities and input verification vulnerabilities.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Thingsboard is a Java-based platform of Thingsboard team for IOT equipment monitoring, management, and data collection
VAR-202012-1269 CVE-2020-4080 HCL Verse  Cross-site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
HCL Verse v10 and v11 is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability due to improper handling of message content. An unauthenticated remote attacker could exploit this vulnerability using specially-crafted markup to execute script in a victim's web browser within the security context of the hosting Web site and/or steal the victim's cookie-based authentication credentials
VAR-202012-0270 CVE-2020-20277 uftpd FTP  Path traversal vulnerability in server CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
There are multiple unauthenticated directory traversal vulnerabilities in different FTP commands in uftpd FTP server versions 2.7 to 2.10 due to improper implementation of a chroot jail in common.c's compose_abspath function that can be abused to read or write to arbitrary files on the filesystem, leak process memory, or potentially lead to remote code execution. uftpd FTP A path traversal vulnerability exists in the server.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202012-0269 CVE-2020-20276 uftpd FTP  Out-of-bounds write vulnerability in server CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An unauthenticated stack-based buffer overflow vulnerability in common.c's handle_PORT in uftpd FTP server versions 2.10 and earlier can be abused to cause a crash and could potentially lead to remote code execution. uftpd FTP The server is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202012-0718 CVE-2020-27715 plural  F5 Networks  Product vulnerabilities CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
On BIG-IP 15.1.0-15.1.0.5 and 14.1.0-14.1.3, crafted TLS request to the BIG-IP management interface via port 443 can cause high (~100%) CPU utilization by the httpd daemon. BIG-IP Access Policy Manager (APM) , BIG-IP Advanced Firewall Manager (AFM) , BIG-IP Analytics etc. multiple F5 Networks There are unspecified vulnerabilities in the product.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. There is a security vulnerability in F5 BIG-IP. Attackers can use this vulnerability to request F5 BIG-IP through the configuration tool TLS to trigger overload and trigger denial of service
VAR-202012-0717 CVE-2020-27714 F5 Networks  of  BIG-IP Advanced Firewall Manager (AFM)  Vulnerability in CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
On the BIG-IP AFM version 15.1.0-15.1.0.5, 14.1.0-14.1.3, and 13.1.0-13.1.3.5, when a Protocol Inspection Profile is attached to a FastL4 virtual server with the protocol field configured to either Other or All Protocols, the TMM may experience a restart if the profile processes non-TCP traffic. F5 Networks of BIG-IP Advanced Firewall Manager (AFM) Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. A security vulnerability exists in the F5 BIG-IP AFM that could allow an attacker to trigger a denial of service by triggering a fatal error in a protocol inspection configuration file. The following products and versions are affected: 15.1.0-15.1.0.5, 14.1.0-14.1.3, and 13.1.0-13.1.3.5
VAR-202012-0726 CVE-2020-27719 plural  F5 Networks  Cross-site scripting vulnerability in the product CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
On BIG-IP 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.3, a cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility. BIG-IP Access Policy Manager (APM) , BIG-IP Advanced Firewall Manager (AFM) , BIG-IP Advanced Web Application Firewall (WAF) etc. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5