VARIoT IoT vulnerabilities database

VAR-202011-0103 | CVE-2020-0573 | Intel CSI2 Host Controller Driver out-of-bounds read vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Out of bounds read in the Intel CSI2 Host Controller driver may allow an authenticated user to potentially enable information disclosure via local access
VAR-202011-1536 | No CVE | Schneider-Electric TwidoSuite has a denial of service vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
TwidoSuite is a PLC programming software developed by Schneider Electric.
Schneider-Electric TwidoSuite has a denial of service vulnerability. Attackers can use this vulnerability to send constructed malicious data packets, which can cause a denial of service.
VAR-202011-1541 | No CVE | General Electric Company VersaMax IC200 has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
The VersaMax series is a small programmable controller.
General Electric Company VersaMax IC200 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202011-0181 | CVE-2020-12336 | Intel NUC Kit default configuration problem vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access. plural Intel(R) NUC There is an initialization vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel NUC Kit is a small desktop computer manufactured by Intel Corporation.
Intel(R) NUCs has a vulnerability in the default configuration problem. The vulnerability stems from insecure default variable initialization
VAR-202011-0182 | CVE-2020-12337 | plural Intel(R) NUC Buffer error vulnerability in firmware |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. plural Intel(R) NUC A buffer error vulnerability exists in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel NUC Kit is a small desktop computer manufactured by Intel Corporation. No detailed vulnerability details are currently provided
VAR-202011-0154 | CVE-2020-12312 | Intel(R) Quartus(R) Prime Pro Buffer error vulnerabilities in software |
CVSS V2: 4.6 CVSS V3: 6.8 Severity: MEDIUM |
Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.2 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. Intel(R) Quartus(R) Prime Pro The software contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Quartus Prime Pro is a multi-platform design environment of Intel Corporation. This product is mainly used for programmable logic device programming. No detailed vulnerability details are currently provided
VAR-202011-1371 | CVE-2020-8692 | Intel(R) Ethernet 700 Series Controller Vulnerability in privilege management |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Insufficient access control in the firmware of the Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. Intel(R) Ethernet 700 Series Controller Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Ethernet 700 Series Controllers is a 700 series Ethernet controller from Intel Corporation.
Intel(R) Ethernet 700 Series Controllers versions prior to 7.3 have a security vulnerability. The vulnerability is due to insufficient access control
VAR-202011-1369 | CVE-2020-8690 | Intel(R) Ethernet 700 Series Controller Vulnerability in privilege management |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Protection mechanism failure in Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. Intel(R) Ethernet 700 Series Controller Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Ethernet 700 Series Controllers is a 700 series Ethernet controller from Intel Corporation.
Intel(R) Ethernet 700 Series Controllers versions prior to 7.3 have a security vulnerability. The vulnerability is caused by a malfunction in the protection mechanism
VAR-202011-1370 | CVE-2020-8691 | Intel(R) Ethernet 700 Series Controller Vulnerability in privilege management |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
A logic issue in the firmware of the Intel(R) Ethernet 700 Series Controllers may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. Intel(R) Ethernet 700 Series Controller Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Ethernet 700 Series Controllers is a 700 series Ethernet controller from Intel Corporation
VAR-202011-1372 | CVE-2020-8693 | Intel(R) Ethernet 700 Series Controller Buffer Error Vulnerability |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Improper buffer restrictions in the firmware of the Intel(R) Ethernet 700 Series Controllers may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. Intel(R) Ethernet 700 Series Controller Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202011-1383 | CVE-2020-8767 | Intel(R) Quartus Prime for Intel(R) 50GbE IP Core Vulnerability in handling exceptional conditions in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Uncaught exception in the Intel(R) 50GbE IP Core for Intel(R) Quartus Prime before version 20.2 may allow an authenticated user to potentially enable denial of service via local access
VAR-202011-1366 | CVE-2020-8669 | Intel(R) Data Center Manager Console Input confirmation vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable information disclosure via network access. This product mainly provides real-time power supply and heat dissipation data of equipment
VAR-202011-1363 | CVE-2020-8737 | Intel(R) Stratix 10 FPGA Runs on firmware Quartus Prime Pro Buffer error vulnerabilities in software |
CVSS V2: 4.6 CVSS V3: 6.8 Severity: MEDIUM |
Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.1 may allow an unauthenticated user to potentially enable escalation of privilege and/or information disclosure via physical access. Intel PAC with Arria 10 GX FPGA is a programmable accelerator card from Intel Corporation using Intel Arria 10 GX FPGA (Field Programmable Gate Array)
VAR-202011-0638 | CVE-2020-24456 | Intel(R) Board ID Tool Inappropriate Default Permission Vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Incorrect default permissions in the Intel(R) Board ID Tool version v.1.01 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel Board ID Tool is a software used by Intel Corporation to interact with Intel motherboards
VAR-202011-0183 | CVE-2020-12338 | Open WebRTC Toolkit Vulnerability in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Insufficient control flow management in the Open WebRTC Toolkit before version 4.3.1 may allow an unauthenticated user to potentially enable escalation of privilege via network access. Open WebRTC Toolkit Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Open WebRTC Toolkit is an open-source, cross-platform WebRTC client framework based on Gstreamer, an end-to-end audio/video communication development kit developed by Intel Corporation. This toolkit is used to create high-performance, reliable and scalable real-time communication applications. A security vulnerability exists in Intel Open WebRTC Toolkit versions prior to 4.3.1
VAR-202011-0179 | CVE-2020-12334 | Intel(R) Advisor tools Vulnerability in improperly holding permissions in the installer |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper permissions in the installer for the Intel(R) Advisor tools before version 2020 Update 2 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) Advisor tools The installer contains a vulnerability related to improper retention of permissions.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel Advisor tools is a programming-oriented vector optimization and prototyping software from Intel Corporation. The software can analyze the code and provide code operation efficiency through a variety of analysis methods
VAR-202011-0178 | CVE-2020-12333 | Intel(R) QAT for Linux Vulnerability regarding inadequate protection of credentials in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Insufficiently protected credentials in the Intel(R) QAT for Linux before version 1.7.l.4.10.0 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) QAT for Linux Exists in an inadequate protection of credentials.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel QuickAssist Technology for Linux is a technology of Intel Corporation that can improve server utilization. This technology balances server pressure by sharing the pressure of computing-intensive tasks to improve server efficiency
VAR-202011-0176 | CVE-2020-12331 | Intel Unite(R) Cloud Service client Vulnerability in privilege management |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper access controls in Intel Unite(R) Cloud Service client before version 4.2.12212 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel Unite is an enterprise conference collaboration solution developed by Intel Corporation of the United States. An attacker could exploit this vulnerability to escalate privileges
VAR-202011-0174 | CVE-2020-12329 | Intel(R) VTune(TM) Profiler Vulnerability in Uncontrolled Search Path Elements |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Uncontrolled search path in the Intel(R) VTune(TM) Profiler before version 2020 Update 1 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) VTune(TM) Profiler There is a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel VTune Profiler is a performance testing tool used by Intel Corporation to optimize software. The software can perform performance tests on embedded applications of the Internet of Things, media software, Java applications, and high-performance computing applications.
The previous version of Intel(R) VTune(TM) Profiler 2020 Update 1 has a security vulnerability. The vulnerability stems from a controlled search path. Attackers can use this vulnerability to upgrade privileges
VAR-202011-0158 | CVE-2020-12316 | Intel(R) EMA Vulnerability regarding inadequate protection of credentials in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Insufficiently protected credentials in the Intel(R) EMA before version 1.3.3 may allow an authorized user to potentially enable information disclosure via local access. Intel(R) EMA Exists in an inadequate protection of credentials.Information may be obtained. Intel Endpoint Management Assistant (Intel EMA) is a management software developed by Intel Corporation for managing remote devices. The software provides security and convenience for telecommuting