VARIoT IoT vulnerabilities database
| VAR-202103-0816 | CVE-2021-22996 | BIG-IQ Centralized Management Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
On all 7.x versions (fixed in 8.0.0), when set up for auto failover, a BIG-IQ Data Collection Device (DCD) cluster member that receives an undisclosed message may cause the corosync process to abort. This behavior may lead to a denial-of-service (DoS) and impact the stability of a BIG-IQ high availability (HA) cluster. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. BIG-IQ Centralized Management Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5
| VAR-202103-0815 | CVE-2021-22995 | BIG-IQ high availability Vulnerability regarding lack of authentication for critical features in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
On all 7.x and 6.x versions (fixed in 8.0.0), BIG-IQ high availability (HA) when using a Quorum device for automatic failover does not implement any form of authentication with the Corosync daemon. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. BIG-IQ high availability There is a vulnerability in the lack of authentication for critical features.Information may be tampered with. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP has a security vulnerability that does not implement any form of authentication using the Corosync daemon
| VAR-202103-1788 | No CVE | SIEMENS RWG1.M12D S55370-C170 has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
The SIEMENS RWG1.M12D S55370-C170 programmable general-purpose controller combines Siemens' years of experience in the building, HVAC and other industries, based on general hardware design, programmable software platform, and powerful communication processing capabilities.
SIEMENS RWG1.M12D S55370-C170 has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
| VAR-202103-1801 | No CVE | SIEMENS-SCALANCE-W788-1 has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
SIEMENS-SCALANCE-W788-1 is a controller product of the SCALANCE series of German Siemens (SIEMENS).
SIEMENS-SCALANCE-W788-1 has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
| VAR-202103-1737 | No CVE | MB80-CPU721E has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
NARI Automation is a high-tech entity integrating software development, hardware development, technical services, equipment production, and system integration.
MB80-CPU721E has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
| VAR-202103-1738 | No CVE | MB80-CPU722E has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
NARI Automation is a high-tech entity integrating software development, hardware development, technical services, equipment production, and system integration.
MB80-CPU722E has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
| VAR-202103-1739 | No CVE | DF9312-DTU has a denial of service vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Dongfang Electronics has developed into a large-scale high-tech enterprise integrating scientific research and development, production and operation, technical services, and system integration. It is one of the main suppliers of energy management system solutions in China.
DF9312-DTU has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202103-1740 | No CVE | MM2-4TX2 has a denial of service vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
The application range of German Hirschmann switch products includes office communication, production automation, process control, traffic control, and independent machine equipment control systems.
MM2-4TX2 has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
| VAR-202103-1741 | No CVE | Skyworth Digital Technology Co., Ltd. Penguin Aurora Box has a denial of service vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Penguin Aurora Box is a high-end network HD set-top box produced by Tencent Video and Skyworth Digital.
Skyworth Digital Technology Co., Ltd. Penguin Aurora Box has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202103-1664 | No CVE | DELTA DOP 107EG has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Delta Group's areas of involvement include the provision of overall solutions for power management, video displays, industrial automation, network communication products, and renewable energy-related products.
DELTA DOP 107EG has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
| VAR-202103-0256 | CVE-2020-35220 | NETGEAR JGS516PE/GS116Ev2 firmware update vulnerability |
CVSS V2: 8.0 CVSS V3: - Severity: HIGH |
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35801. Reason: This candidate is a reservation duplicate of CVE-2020-35801. Notes: All CVE users should reference CVE-2020-35801 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. NETGEAR JGS516PE/GS116Ev2 is a 16-port gigabit intelligent network management Plus switch.
NETGEAR JGS516PE/GS116Ev2 2.6.0.43 version has firmware update vulnerability. The vulnerability stems from the fact that the TFTP server is active by default. An attacker can use this vulnerability to update the switch firmware
| VAR-202103-0258 | CVE-2020-35222 | NETGEAR JGS516PE/GS116Ev2 Information Disclosure Vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35783. Reason: This candidate is a reservation duplicate of CVE-2020-35783. Notes: All CVE users should reference CVE-2020-35783 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. NETGEAR JGS516PE/GS116Ev2 is a 16-port gigabit intelligent network management Plus switch.
NETGEAR JGS516PE/GS116Ev2 2.6.0.43 version of the NSDP protocol implementation has an information disclosure vulnerability. A remote unauthenticated attacker can use this vulnerability to obtain all configuration parameters of the switch by sending a corresponding read request
| VAR-202103-0257 | CVE-2020-35221 | NETGEAR JGS516PE and GS116E Cryptographic strength vulnerabilities in devices |
CVSS V2: 3.3 CVSS V3: 8.8 Severity: HIGH |
The hashing algorithm implemented for NSDP password authentication on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices was found to be insecure, allowing attackers (with access to a network capture) to quickly generate multiple collisions to generate valid passwords, or infer some parts of the original. NETGEAR JGS516PE and GS116E There are cryptographic strength vulnerabilities in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. NETGEAR JGS516PE/GS116Ev2 is a 16-port gigabit intelligent network management Plus switch.
NETGEAR JGS516PE/GS116Ev2 2.6.0.43 version has security vulnerabilities. Allow external attackers to gain administrative access to the switch
| VAR-202103-0262 | CVE-2020-35226 | NETGEAR JGS516PE and GS116E Vulnerability regarding lack of authentication for critical features on the device |
CVSS V2: 4.8 CVSS V3: 7.1 Severity: HIGH |
NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices allow unauthenticated users to modify the switch DHCP configuration by sending the corresponding write request command. NETGEAR JGS516PE and GS116E The device is vulnerable to a lack of authentication for critical features.Information is tampered with and denial of service (DoS) It may be put into a state. NETGEAR JGS516PE/GS116Ev2 is a 16-port gigabit intelligent network management Plus switch.
NETGEAR JGS516PE/GS116Ev2 2.6.0.43 version has security vulnerabilities. Attackers can use the vulnerability to force multiple DHCP requests or disable them, which may lead to a denial of service attack
| VAR-202103-0266 | CVE-2020-35230 | NETGEAR JGS516PE and GS116E Integer overflow vulnerability in device |
CVSS V2: 6.7 CVSS V3: 6.8 Severity: MEDIUM |
Multiple integer overflow parameters were found in the web administration panel on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices. Most of the integer parameters sent through the web server can be abused to cause a denial of service attack. NETGEAR JGS516PE and GS116E An integer overflow vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. NETGEAR JGS516PE/GS116Ev2 is a 16-port gigabit intelligent network management Plus switch
| VAR-202103-0259 | CVE-2020-35223 | NETGEAR JGS516PE and GS116Ev2 Cross-site request forgery vulnerability in device |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
The CSRF protection mechanism implemented in the web administration panel on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices could be bypassed by omitting the CSRF token parameter in HTTP requests. NETGEAR JGS516PE and GS116Ev2 A cross-site request forgery vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202103-0261 | CVE-2020-35225 | NETGEAR JGS516PE and GS116Ev2 Classic buffer overflow vulnerability in device |
CVSS V2: 5.2 CVSS V3: 6.8 Severity: MEDIUM |
The NSDP protocol implementation on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices was not properly validating the length of string parameters sent in write requests, potentially allowing denial of service attacks. NETGEAR JGS516PE and GS116Ev2 A classic buffer overflow vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. NETGEAR JGS516PE/GS116Ev2 is a 16-port gigabit intelligent network management Plus switch.
NETGEAR JGS516PE/GS116Ev2 2.6.0.43 version has security vulnerabilities. An attacker can use this vulnerability to cause a denial of service
| VAR-202103-0265 | CVE-2020-35229 | NETGEAR JGS516PE and GS116E Session immobilization vulnerability in device |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
The authentication token required to execute NSDP write requests on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices is not properly invalidated and can be reused until a new token is generated, which allows attackers (with access to network traffic) to effectively gain administrative privileges. NETGEAR JGS516PE and GS116E A session immobilization vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. NETGEAR JGS516PE/GS116Ev2 is a 16-port gigabit intelligent network management Plus switch.
NETGEAR JGS516PE/GS116Ev2 2.6.0.43 has an authentication token reuse vulnerability. An attacker can use this vulnerability to gain administrator privileges
| VAR-202103-0267 | CVE-2020-35231 | NETGEAR JGS516PE and GS116E Authentication vulnerability in device |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
The NSDP protocol implementation on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices was affected by an authentication issue that allows an attacker to bypass access controls and obtain full control of the device. NETGEAR JGS516PE and GS116E There is an authentication vulnerability in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. NETGEAR JGS516PE/GS116Ev2 is a 16-port gigabit intelligent network management Plus switch
| VAR-202103-0264 | CVE-2020-35228 | NETGEAR JGS516PE and GS116E Cross-site scripting vulnerabilities in devices |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
A cross-site scripting (XSS) vulnerability in the administration web panel on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices allows remote attackers to inject arbitrary web script or HTML via the language parameter. NETGEAR JGS516PE and GS116E A cross-site scripting vulnerability exists in the device.Information may be obtained and information may be tampered with. NETGEAR JGS516PE/GS116Ev2 is a 16-port gigabit intelligent network management Plus switch