VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202011-0103 CVE-2020-0573 Intel CSI2 Host Controller  Driver out-of-bounds read vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Out of bounds read in the Intel CSI2 Host Controller driver may allow an authenticated user to potentially enable information disclosure via local access
VAR-202011-1536 No CVE Schneider-Electric TwidoSuite has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
TwidoSuite is a PLC programming software developed by Schneider Electric. Schneider-Electric TwidoSuite has a denial of service vulnerability. Attackers can use this vulnerability to send constructed malicious data packets, which can cause a denial of service.
VAR-202011-1541 No CVE General Electric Company VersaMax IC200 has a denial of service vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
The VersaMax series is a small programmable controller. General Electric Company VersaMax IC200 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202011-0181 CVE-2020-12336 Intel NUC Kit default configuration problem vulnerability CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access. plural Intel(R) NUC There is an initialization vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel NUC Kit is a small desktop computer manufactured by Intel Corporation. Intel(R) NUCs has a vulnerability in the default configuration problem. The vulnerability stems from insecure default variable initialization
VAR-202011-0182 CVE-2020-12337 plural  Intel(R) NUC  Buffer error vulnerability in firmware CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. plural Intel(R) NUC A buffer error vulnerability exists in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel NUC Kit is a small desktop computer manufactured by Intel Corporation. No detailed vulnerability details are currently provided
VAR-202011-0154 CVE-2020-12312 Intel(R) Quartus(R) Prime Pro  Buffer error vulnerabilities in software CVSS V2: 4.6
CVSS V3: 6.8
Severity: MEDIUM
Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.2 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. Intel(R) Quartus(R) Prime Pro The software contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Quartus Prime Pro is a multi-platform design environment of Intel Corporation. This product is mainly used for programmable logic device programming. No detailed vulnerability details are currently provided
VAR-202011-1371 CVE-2020-8692 Intel(R) Ethernet 700 Series Controller  Vulnerability in privilege management CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Insufficient access control in the firmware of the Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. Intel(R) Ethernet 700 Series Controller Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Ethernet 700 Series Controllers is a 700 series Ethernet controller from Intel Corporation. Intel(R) Ethernet 700 Series Controllers versions prior to 7.3 have a security vulnerability. The vulnerability is due to insufficient access control
VAR-202011-1369 CVE-2020-8690 Intel(R) Ethernet 700 Series Controller  Vulnerability in privilege management CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Protection mechanism failure in Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. Intel(R) Ethernet 700 Series Controller Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Ethernet 700 Series Controllers is a 700 series Ethernet controller from Intel Corporation. Intel(R) Ethernet 700 Series Controllers versions prior to 7.3 have a security vulnerability. The vulnerability is caused by a malfunction in the protection mechanism
VAR-202011-1370 CVE-2020-8691 Intel(R) Ethernet 700 Series Controller  Vulnerability in privilege management CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
A logic issue in the firmware of the Intel(R) Ethernet 700 Series Controllers may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. Intel(R) Ethernet 700 Series Controller Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Ethernet 700 Series Controllers is a 700 series Ethernet controller from Intel Corporation
VAR-202011-1372 CVE-2020-8693 Intel(R) Ethernet 700 Series Controller  Buffer Error Vulnerability CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Improper buffer restrictions in the firmware of the Intel(R) Ethernet 700 Series Controllers may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. Intel(R) Ethernet 700 Series Controller Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202011-1383 CVE-2020-8767 Intel(R) Quartus Prime  for  Intel(R) 50GbE IP Core  Vulnerability in handling exceptional conditions in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Uncaught exception in the Intel(R) 50GbE IP Core for Intel(R) Quartus Prime before version 20.2 may allow an authenticated user to potentially enable denial of service via local access
VAR-202011-1366 CVE-2020-8669 Intel(R) Data Center Manager Console  Input confirmation vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable information disclosure via network access. This product mainly provides real-time power supply and heat dissipation data of equipment
VAR-202011-1363 CVE-2020-8737 Intel(R) Stratix 10 FPGA  Runs on firmware  Quartus Prime Pro  Buffer error vulnerabilities in software CVSS V2: 4.6
CVSS V3: 6.8
Severity: MEDIUM
Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.1 may allow an unauthenticated user to potentially enable escalation of privilege and/or information disclosure via physical access. Intel PAC with Arria 10 GX FPGA is a programmable accelerator card from Intel Corporation using Intel Arria 10 GX FPGA (Field Programmable Gate Array)
VAR-202011-0638 CVE-2020-24456 Intel(R) Board ID Tool  Inappropriate Default Permission Vulnerability CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Incorrect default permissions in the Intel(R) Board ID Tool version v.1.01 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel Board ID Tool is a software used by Intel Corporation to interact with Intel motherboards
VAR-202011-0183 CVE-2020-12338 Open WebRTC Toolkit  Vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Insufficient control flow management in the Open WebRTC Toolkit before version 4.3.1 may allow an unauthenticated user to potentially enable escalation of privilege via network access. Open WebRTC Toolkit Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Open WebRTC Toolkit is an open-source, cross-platform WebRTC client framework based on Gstreamer, an end-to-end audio/video communication development kit developed by Intel Corporation. This toolkit is used to create high-performance, reliable and scalable real-time communication applications. A security vulnerability exists in Intel Open WebRTC Toolkit versions prior to 4.3.1
VAR-202011-0179 CVE-2020-12334 Intel(R) Advisor tools  Vulnerability in improperly holding permissions in the installer CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Improper permissions in the installer for the Intel(R) Advisor tools before version 2020 Update 2 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) Advisor tools The installer contains a vulnerability related to improper retention of permissions.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Advisor tools is a programming-oriented vector optimization and prototyping software from Intel Corporation. The software can analyze the code and provide code operation efficiency through a variety of analysis methods
VAR-202011-0178 CVE-2020-12333 Intel(R) QAT for Linux  Vulnerability regarding inadequate protection of credentials in CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Insufficiently protected credentials in the Intel(R) QAT for Linux before version 1.7.l.4.10.0 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) QAT for Linux Exists in an inadequate protection of credentials.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel QuickAssist Technology for Linux is a technology of Intel Corporation that can improve server utilization. This technology balances server pressure by sharing the pressure of computing-intensive tasks to improve server efficiency
VAR-202011-0176 CVE-2020-12331 Intel Unite(R) Cloud Service client  Vulnerability in privilege management CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Improper access controls in Intel Unite(R) Cloud Service client before version 4.2.12212 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel Unite is an enterprise conference collaboration solution developed by Intel Corporation of the United States. An attacker could exploit this vulnerability to escalate privileges
VAR-202011-0174 CVE-2020-12329 Intel(R) VTune(TM) Profiler  Vulnerability in Uncontrolled Search Path Elements CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Uncontrolled search path in the Intel(R) VTune(TM) Profiler before version 2020 Update 1 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) VTune(TM) Profiler There is a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel VTune Profiler is a performance testing tool used by Intel Corporation to optimize software. The software can perform performance tests on embedded applications of the Internet of Things, media software, Java applications, and high-performance computing applications. The previous version of Intel(R) VTune(TM) Profiler 2020 Update 1 has a security vulnerability. The vulnerability stems from a controlled search path. Attackers can use this vulnerability to upgrade privileges
VAR-202011-0158 CVE-2020-12316 Intel(R) EMA  Vulnerability regarding inadequate protection of credentials in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Insufficiently protected credentials in the Intel(R) EMA before version 1.3.3 may allow an authorized user to potentially enable information disclosure via local access. Intel(R) EMA Exists in an inadequate protection of credentials.Information may be obtained. Intel Endpoint Management Assistant (Intel EMA) is a management software developed by Intel Corporation for managing remote devices. The software provides security and convenience for telecommuting