VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202011-0790 CVE-2020-27556 BASETech GE-131 BT-1837836  Firmware vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A predictable device ID in BASETech GE-131 BT-1837836 firmware 20180921 allows unauthenticated remote attackers to connect to the device. BASETech GE-131 BT-1837836 There is an unspecified vulnerability in the firmware.Information may be tampered with. BASETech GE-131 BT-1837836 is a Wi-Fi IP CCTV camera
VAR-202011-1431 CVE-2020-4592 IBM MQ Appliance  Vulnerability in CVSS V2: 3.5
CVSS V3: 6.5
Severity: Medium
IBM MQ Appliance 9.1.CD and LTS could allow an authenticated user, under nondefault configuration to cause a data corruption attack due to an error when using segmented messages. IBM MQ Appliance Contains an unspecified vulnerability.Information may be tampered with
VAR-202105-0131 CVE-2020-25709 OpenLDAP  Reachable assertion vulnerabilities in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability. OpenLDAP Exists in a reachable assertion vulnerability.Denial of service (DoS) It may be put into a state. Summary: The Migration Toolkit for Containers (MTC) 1.5.4 is now available. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/): 1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic 5. Summary: Red Hat Advanced Cluster Management for Kubernetes 2.2.11 General Availability release images, which provide one or more container updates and bug fixes. Description: Red Hat Advanced Cluster Management for Kubernetes 2.2.11 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console — with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide security fixes, bug fixes and container upgrades. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/ Security updates: * object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256 (CVE-2021-23434) * follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-0155) Related bugs: * RHACM 2.2.11 images (Bugzilla #2029508) * ClusterImageSet has 4.5 which is not supported in ACM 2.2.10 (Bugzilla #2030859) 3. Bugs fixed (https://bugzilla.redhat.com/): 1999810 - CVE-2021-23434 object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256 2029508 - RHACM 2.2.11 images 2030859 - ClusterImageSet has 4.5 which is not supported in ACM 2.2.10 2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor 5. Description: Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Bugs fixed (https://bugzilla.redhat.com/): 2062751 - CVE-2022-24730 argocd: path traversal and improper access control allows leaking out-of-bound files 2062755 - CVE-2022-24731 argocd: path traversal allows leaking out-of-bound files 2064682 - CVE-2022-1025 Openshift-Gitops: Improper access control allows admin privilege escalation 5. ========================================================================= Ubuntu Security Notice USN-4634-2 November 23, 2020 openldap vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM - Ubuntu 12.04 ESM Summary: OpenLDAP could be made to crash if it received specially crafted network traffic. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: It was discovered that OpenLDAP incorrectly handled certain malformed inputs. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: slapd 2.4.31-1+nmu2ubuntu8.5+esm4 Ubuntu 12.04 ESM: slapd 2.4.28-1.1ubuntu4.12 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openldap security update Advisory ID: RHSA-2022:0621-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:0621 Issue date: 2022-02-22 CVE Names: CVE-2020-25709 CVE-2020-25710 ===================================================================== 1. Summary: An update for openldap is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. Security Fix(es): * openldap: assertion failure in Certificate List syntax validation (CVE-2020-25709) * openldap: assertion failure in CSN normalization with invalid input (CVE-2020-25710) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1899675 - CVE-2020-25709 openldap: assertion failure in Certificate List syntax validation 1899678 - CVE-2020-25710 openldap: assertion failure in CSN normalization with invalid input 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: openldap-2.4.44-25.el7_9.src.rpm x86_64: openldap-2.4.44-25.el7_9.i686.rpm openldap-2.4.44-25.el7_9.x86_64.rpm openldap-clients-2.4.44-25.el7_9.x86_64.rpm openldap-debuginfo-2.4.44-25.el7_9.i686.rpm openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: openldap-debuginfo-2.4.44-25.el7_9.i686.rpm openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm openldap-devel-2.4.44-25.el7_9.i686.rpm openldap-devel-2.4.44-25.el7_9.x86_64.rpm openldap-servers-2.4.44-25.el7_9.x86_64.rpm openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: openldap-2.4.44-25.el7_9.src.rpm x86_64: openldap-2.4.44-25.el7_9.i686.rpm openldap-2.4.44-25.el7_9.x86_64.rpm openldap-clients-2.4.44-25.el7_9.x86_64.rpm openldap-debuginfo-2.4.44-25.el7_9.i686.rpm openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: openldap-debuginfo-2.4.44-25.el7_9.i686.rpm openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm openldap-devel-2.4.44-25.el7_9.i686.rpm openldap-devel-2.4.44-25.el7_9.x86_64.rpm openldap-servers-2.4.44-25.el7_9.x86_64.rpm openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openldap-2.4.44-25.el7_9.src.rpm ppc64: openldap-2.4.44-25.el7_9.ppc.rpm openldap-2.4.44-25.el7_9.ppc64.rpm openldap-clients-2.4.44-25.el7_9.ppc64.rpm openldap-debuginfo-2.4.44-25.el7_9.ppc.rpm openldap-debuginfo-2.4.44-25.el7_9.ppc64.rpm openldap-devel-2.4.44-25.el7_9.ppc.rpm openldap-devel-2.4.44-25.el7_9.ppc64.rpm openldap-servers-2.4.44-25.el7_9.ppc64.rpm ppc64le: openldap-2.4.44-25.el7_9.ppc64le.rpm openldap-clients-2.4.44-25.el7_9.ppc64le.rpm openldap-debuginfo-2.4.44-25.el7_9.ppc64le.rpm openldap-devel-2.4.44-25.el7_9.ppc64le.rpm openldap-servers-2.4.44-25.el7_9.ppc64le.rpm s390x: openldap-2.4.44-25.el7_9.s390.rpm openldap-2.4.44-25.el7_9.s390x.rpm openldap-clients-2.4.44-25.el7_9.s390x.rpm openldap-debuginfo-2.4.44-25.el7_9.s390.rpm openldap-debuginfo-2.4.44-25.el7_9.s390x.rpm openldap-devel-2.4.44-25.el7_9.s390.rpm openldap-devel-2.4.44-25.el7_9.s390x.rpm openldap-servers-2.4.44-25.el7_9.s390x.rpm x86_64: openldap-2.4.44-25.el7_9.i686.rpm openldap-2.4.44-25.el7_9.x86_64.rpm openldap-clients-2.4.44-25.el7_9.x86_64.rpm openldap-debuginfo-2.4.44-25.el7_9.i686.rpm openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm openldap-devel-2.4.44-25.el7_9.i686.rpm openldap-devel-2.4.44-25.el7_9.x86_64.rpm openldap-servers-2.4.44-25.el7_9.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: openldap-debuginfo-2.4.44-25.el7_9.ppc64.rpm openldap-servers-sql-2.4.44-25.el7_9.ppc64.rpm ppc64le: openldap-debuginfo-2.4.44-25.el7_9.ppc64le.rpm openldap-servers-sql-2.4.44-25.el7_9.ppc64le.rpm s390x: openldap-debuginfo-2.4.44-25.el7_9.s390x.rpm openldap-servers-sql-2.4.44-25.el7_9.s390x.rpm x86_64: openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: openldap-2.4.44-25.el7_9.src.rpm x86_64: openldap-2.4.44-25.el7_9.i686.rpm openldap-2.4.44-25.el7_9.x86_64.rpm openldap-clients-2.4.44-25.el7_9.x86_64.rpm openldap-debuginfo-2.4.44-25.el7_9.i686.rpm openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm openldap-devel-2.4.44-25.el7_9.i686.rpm openldap-devel-2.4.44-25.el7_9.x86_64.rpm openldap-servers-2.4.44-25.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-25709 https://access.redhat.com/security/cve/CVE-2020-25710 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYhVgl9zjgjWX9erEAQizoA//Z1eRFFiALCnBNdscadCiTK27uxUBYwiE mazVTDFOQUIzF2+hpruaDD0RJoIuZL8JwTPviUZJbB21G8NIF5T09eP00ErioZEN WMeccz1GyZlUXWZXBvf3v5QOMOmhBK3vw80X6oVCzGZbzMynCtPI8+jCt/MmzA0y fpLghp4rd7o56kF3ccb3ZbLREFNYFwyNqzVT79LA0KdA2KnMY/pFBTSmY8ihiTTJ qvIekeg+Xj5t85JObesMRwM1yrEG+joYcXe9uqRjOLvCGPdXSM5YMcOxNyNynjnI EGIqGr9/+2OVxhHCLaITvuBaqPeIgCZxO9yvKgoNDsuBpDUEKgv+iQ1l0DnfIThr ppeoo+MeNMB54Qw+qf9MQblhLFFS08zUNXq7YsJi58kIp6PEtj2Q/7DvVMY6GcPN 3hltIwlWAY4+PToSbt9UvJEmAdH1ApN0XSiBva6e295C92v1IvDYN0BkD8XouOAH 5tKXXheyJfoN6vjJG89halj6gzy4IcPU5KkfJuJO3vKJeDkG3vRoySIxW0SDrdS8 +4XGwe6e00D/Kd1t9yXIeITCCtiK3NZS5bMsOHclxzbrGeWj4YK/jK7CfK5g+Zt0 0PKI5pZqGdc3SwDNo165BVDChTc7HZqjmp6LFYzKyBSkwgdHzGG/soj51hWqyVui UnjGg9lAM38= =OWtf -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
VAR-202011-0731 CVE-2020-27125 Cisco Security Manager  Input confirmation vulnerability CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in Cisco Security Manager could allow an unauthenticated, remote attacker to access sensitive information on an affected system. The vulnerability is due to insufficient protection of static credentials in the affected software. An attacker could exploit this vulnerability by viewing source code. A successful exploit could allow the attacker to view static credentials, which the attacker could use to carry out further attacks. Cisco Security Manager (CSM) is a set of enterprise-level management applications from Cisco, which is mainly used to configure firewall, VPN and intrusion prevention security services on Cisco network and security devices
VAR-202011-0735 CVE-2020-27130 Cisco Security Manager  Vulnerability in CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
A vulnerability in Cisco Security Manager could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within requests to an affected device. An attacker could exploit this vulnerability by sending a crafted request to the affected device. A successful exploit could allow the attacker to download arbitrary files from the affected device. Cisco Security Manager (CSM) is a set of enterprise-level management applications from Cisco, which is mainly used to configure firewall, VPN and intrusion prevention security services on Cisco network and security devices
VAR-202011-0393 CVE-2020-26701 Kaa IoT Platform  Cross-site Scripting Vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in Dashboards section in Kaa IoT Platform v1.2.0 allows remote attackers to inject malicious web scripts or HTML Injection payloads via the Description parameter. Kaa IoT Platform Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. The platform provides protocol support for multiple devices, and provides monitoring and data management functions for connected devices
VAR-202011-0736 CVE-2020-27131 Cisco Security Manager  Untrusted Data Deserialization Vulnerability in CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Multiple vulnerabilities in the Java deserialization function that is used by Cisco Security Manager could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. These vulnerabilities are due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit these vulnerabilities by sending a malicious serialized Java object to a specific listener on an affected system. A successful exploit could allow the attacker to execute arbitrary commands on the device with the privileges of NT AUTHORITY\SYSTEM on the Windows target host. Cisco has not released software updates that address these vulnerabilities. Cisco Security Manager There is a vulnerability in deserialization of untrusted data.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco Security Manager (CSM) is a set of enterprise-level management applications from Cisco, which is mainly used to configure firewall, VPN and intrusion prevention security services on Cisco network and security devices. Successful exploitation could result in arbitrary command execution on the affected device
VAR-202012-1523 CVE-2020-9972 plural  Apple  Product Buffer Overflow Vulnerability CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 14.0 and iPadOS 14.0. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. The following products and versions are affected: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later
VAR-202011-0266 CVE-2019-19560 Mercedes-Benz HERMES  Vulnerability in insecure storage of important information in CVSS V2: 2.1
CVSS V3: 4.6
Severity: MEDIUM
An authentication bypass in the debug interface in Mercedes-Benz HERMES 1.5 allows an attacker with physical access to device hardware to obtain system information. Mercedes-Benz HERMES There is a vulnerability in the insecure storage of important information.Information may be obtained. Mercedes-Benz HERMES is a telematics control unit equipped in Mercedes-Benz (Mercedes-Benz) networked cars
VAR-202011-0267 CVE-2019-19561 Mercedes-Benz HERMES  Vulnerability in insecure storage of important information in CVSS V2: 2.1
CVSS V3: 2.4
Severity: LOW
A misconfiguration in the debug interface in Mercedes-Benz HERMES 1.5 allows an attacker with direct physical access to device hardware to obtain cellular modem information. Mercedes-Benz HERMES There is a vulnerability in the insecure storage of important information.Information may be obtained. Mercedes-Benz HERMES is a telematics control unit equipped in Mercedes-Benz (Mercedes-Benz) networked cars
VAR-202011-0265 CVE-2019-19557 Mercedes-Benz HERMES  Vulnerability in insecure storage of important information in CVSS V2: 2.1
CVSS V3: 2.4
Severity: LOW
A misconfiguration in the debug interface in Mercedes-Benz HERMES 1 allows an attacker with direct physical access to device hardware to obtain cellular modem information. Mercedes-Benz HERMES There is a vulnerability in the insecure storage of important information.Information may be obtained. Mercedes-Benz HERMES is a telematics control unit equipped in Mercedes-Benz (Mercedes-Benz) networked cars. The debug interface in Mercedes-Benz HERMES 1 has a configuration error vulnerability
VAR-202011-0268 CVE-2019-19562 Mercedes-Benz HERMES  Vulnerability in insecure storage of important information in CVSS V2: 2.1
CVSS V3: 4.6
Severity: MEDIUM
An authentication bypass in the debug interface in Mercedes-Benz HERMES 2.1 allows an attacker with physical access to device hardware to obtain system information. Mercedes-Benz HERMES There is a vulnerability in the insecure storage of important information.Information may be obtained. Mercedes-Benz HERMES is a telematics control unit equipped in Mercedes-Benz (Mercedes-Benz) networked cars
VAR-202011-0269 CVE-2019-19563 Mercedes-Benz HERMES configuration error vulnerability CVSS V2: 2.1
CVSS V3: 2.4
Severity: LOW
A misconfiguration in the debug interface in Mercedes-Benz HERMES 2.1 allows an attacker with direct physical access to device hardware to obtain cellular modem information. Mercedes-Benz HERMES Contains an unspecified vulnerability.Information may be obtained. Mercedes-Benz HERMES is a telematics control unit equipped in Mercedes-Benz (Mercedes-Benz) networked cars. The debugging interface in Mercedes-Benz HERMES 2.1 has a configuration error vulnerability
VAR-202011-0264 CVE-2019-19556 Mercedes-Benz HERMES  Authentication vulnerabilities in CVSS V2: 2.1
CVSS V3: 4.6
Severity: MEDIUM
An authentication bypass in the debug interface in Mercedes-Benz HERMES 1 allows an attacker with physical access to device hardware to obtain system information. Mercedes-Benz HERMES Contains an authentication vulnerability.Information may be obtained. Mercedes-Benz HERMES is a telematics control unit equipped in Mercedes-Benz (Mercedes-Benz) networked cars
VAR-202011-1543 No CVE Beijing Sifang Relay Automation Co., Ltd. CSC-830 has a denial of service vulnerability (CNVD-2020-59456) CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
CSC830 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small and medium discrete automation systems and independent automation systems. Beijing Sifang Relay Automation Co., Ltd. CSC-830 has a denial of service vulnerability. Attackers can use this vulnerability to control PLC services, affecting the normal operation of the controller and causing denial of service.
VAR-202011-1545 No CVE Beijing Sifang Relay Automation Co., Ltd. CSC-830 has a denial of service vulnerability (CNVD-2020-59455) CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
CSC830 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small and medium discrete automation systems and independent automation systems. Beijing Sifang Relay Automation Co., Ltd. CSC-830 has a denial of service vulnerability. Attackers can use this vulnerability to directly control the cold start or stop of the PLC remotely, affecting the normal operation of the controller.
VAR-202011-1561 No CVE Beijing Sifang Relay Automation Co., Ltd. CSC-830 has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
CSC830 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small and medium discrete automation systems and independent automation systems. Beijing Sifang Relay Automation Co., Ltd. CSC-830 has a denial of service vulnerability. Attackers can use the vulnerability to cause a denial of server.
VAR-202011-1562 No CVE Beijing Sifang Relay Automation Co., Ltd. CSC-830 has an information disclosure vulnerability (CNVD-2020-59458) CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
CSC830 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small and medium discrete automation systems and independent automation systems. Beijing Sifang Relay Automation Co., Ltd. CSC-830 has an information disclosure vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202011-1563 No CVE Beijing Sifang Relay Automation Co., Ltd. CSC-850 has an information disclosure vulnerability (CNVD-2020-58374) CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
CSC850 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small and medium discrete automation systems and independent automation systems. Beijing Sifang Relay Automation Co., Ltd. CSC-850 has an information disclosure vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202011-1564 No CVE Beijing Sifang Relay Automation Co., Ltd. CSC-850 has an information disclosure vulnerability (CNVD-2020-58375) CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
CSC850 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small and medium discrete automation systems and independent automation systems. Beijing Sifang Relay Automation Co., Ltd. CSC-850 has an information disclosure vulnerability. Attackers can use this vulnerability to obtain sensitive information such as PLC logs, firmware, configuration and other core files.