VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202103-1744 No CVE Baima Technology Edge Computing Gateway BMG700 has an information disclosure vulnerability CVSS V2: 3.3
CVSS V3: -
Severity: LOW
Xiamen Baima Technology Co., Ltd. focuses on the Industrial Internet of Things (IIoT: Industrial Internet of Things), providing users with industrial-grade data collection, communication networking, cloud platforms and other intelligent products and solutions. The edge computing gateway BMG700 of Baima Technology has an information disclosure vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
VAR-202103-1745 No CVE H3C GR3200 router has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The H3C GR3200 router is a new generation of high-performance enterprise-class routers launched by H3C. The H3C GR3200 router has a weak password vulnerability. Attackers use this vulnerability to log in to the background of the system to obtain sensitive information.
VAR-202106-1440 CVE-2021-26845 Hitachi ABB Power Grids eSOMS  Fraud related to unauthorized authentication in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Information Exposure vulnerability in Hitachi ABB Power Grids eSOMS allows unauthorized user to gain access to report data if the URL used to access the report is discovered. This issue affects: Hitachi ABB Power Grids eSOMS 6.0 versions prior to 6.0.4.2.2; 6.1 versions prior to 6.1.4; 6.3 versions prior to 6.3. ABB eSOMS (Electronic Shift Operations Management System) is a set of factory operation management system of Swiss ABB company
VAR-202103-0899 CVE-2021-27306 Kong Gateway Access control error vulnerability CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
An improper access control vulnerability in the JWT plugin in Kong Gateway prior to 2.3.2.0 allows unauthenticated users access to authenticated routes without a valid token JWT. Kong Gateway is an API gateway of the Italian (Kong) company. A gateway is provided
VAR-202103-0870 CVE-2021-27221 MikroTik RouterOS  Command injection vulnerability CVSS V2: 8.5
CVSS V3: 8.1
Severity: HIGH
MikroTik RouterOS 6.47.9 allows remote authenticated ftp users to create or overwrite arbitrary .rsc files via the /export command. NOTE: the vendor's position is that this is intended behavior because of how user policies work. ** Unsettled ** This case has not been confirmed as a vulnerability. MikroTik RouterOS Contains a command injection vulnerability. Vendors have challenged this vulnerability. For more information, please see below NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2021-27221Information is tampered with and denial of service (DoS) It may be put into a state. MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality
VAR-202103-1810 No CVE MOXA AWK-1131A has command execution vulnerability CVSS V2: 6.5
CVSS V3: -
Severity: MEDIUM
AWK-1131A is an industrial-grade wireless AP. MOXA AWK-1131A has a command execution vulnerability, which can be exploited by attackers to execute malicious code.
VAR-202103-1742 No CVE Hisense Ethernet Passive Fiber Access User Equipment (EPON ONU) IP906H-FV1 has a denial of service vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Hisense Group Co., Ltd. is an electronic information industry group company. Hisense Ethernet Passive Optical Access User-End Equipment (EPON ONU) IP906H-FV1 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202103-0469 CVE-2021-1287 Cisco RV132W ADSL2+ Wireless-N VPN  Router and  RV134W VDSL2 Wireless-AC VPN  Stack-based buffer overflow vulnerability in routers CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
A vulnerability in the web-based management interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition on the affected device. Cisco RV132W ADSL2+ Wireless-N VPN Router and RV134W VDSL2 Wireless-AC VPN A stack-based buffer overflow vulnerability exists in the router.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202103-1667 No CVE EPON Tianyi gateway has a denial of service vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Tianyi Gateway is a hardware terminal of "Optical Modem Smart Router". EPON Tianyi gateway has a denial of service vulnerability. Attackers can use this vulnerability to restart the device multiple times.
VAR-202103-1668 No CVE Command execution vulnerability exists in Cisco rv130w CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Cisco is the world's leading provider of network solutions. Cisco rv130w has command execution vulnerabilities. Attackers can gain system root privileges by constructing rop.
VAR-202103-1287 CVE-2021-3127 NATS Server Access Control Error Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled. NATS Server and JWT library Contains an improper authentication vulnerability.Information may be obtained. NATS Server is an open source messaging system. The system is mainly used for cloud-native applications, IoT messaging, and microservice architecture. No detailed vulnerability details are currently provided
VAR-202103-0910 CVE-2021-27436 Advantech WebAccess/SCADA cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
WebAccess/SCADA Versions 9.0 and prior is vulnerable to cross-site scripting, which may allow an attacker to send malicious JavaScript code to an unsuspecting user, which could result in hijacking of the user’s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser actions. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment. Advantech WebAccess/SCADA 9.0 and earlier versions have cross-site scripting vulnerabilities
VAR-202103-0233 CVE-2020-28899 plural  Zyxel  Vulnerability in lack of authentication for critical features in the product CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
The Web CGI Script on ZyXEL LTE4506-M606 V1.00(ABDO.2)C0 devices does not require authentication, which allows remote unauthenticated attackers (via crafted JSON action data to /cgi-bin/gui.cgi) to use all features provided by the router. Examples: change the router password, retrieve the Wi-Fi passphrase, send an SMS message, or modify the IP forwarding to access the internal network. plural Zyxel The product is vulnerable to a lack of authentication for critical features.Information may be obtained and information may be tampered with
VAR-202103-0218 CVE-2020-27827 Open vSwitch  Resource Depletion Vulnerability CVSS V2: 7.1
CVSS V3: 7.5
Severity: HIGH
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. Open vSwitch Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state. Canonical Ubuntu is a set of desktop application-based GNU/Linux operating system developed by British company Canonical. A security vulnerability exists in the Ubuntu lldp software that could be exploited by an attacker to trigger a denial of service attack. The following products and models are affected: Ubuntu 20.10 openvswitch-common, Ubuntu 20.04 LTS openvswitch-common Ubuntu 18.04 LTS openvswitch-common, Ubuntu 16.04 LTS: openvswitch-common. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202311-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: Open vSwitch: Multiple Vulnerabilities Date: November 26, 2023 Bugs: #765346, #769995, #803107, #887561 ID: 202311-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple denial of service vulnerabilites have been found in Open vSwitch. Background ========= Open vSwitch is a production quality multilayer virtual switch. Affected packages ================ Package Vulnerable Unaffected -------------------- ------------ ------------ net-misc/openvswitch < 2.17.6 >= 2.17.6 Description ========== Multiple vulnerabilities have been discovered in Open vSwitch. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Open vSwitch users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/openvswitch-2.17.6" References ========= [ 1 ] CVE-2020-27827 https://nvd.nist.gov/vuln/detail/CVE-2020-27827 [ 2 ] CVE-2020-35498 https://nvd.nist.gov/vuln/detail/CVE-2020-35498 [ 3 ] CVE-2021-3905 https://nvd.nist.gov/vuln/detail/CVE-2021-3905 [ 4 ] CVE-2021-36980 https://nvd.nist.gov/vuln/detail/CVE-2021-36980 [ 5 ] CVE-2022-4337 https://nvd.nist.gov/vuln/detail/CVE-2022-4337 [ 6 ] CVE-2022-4338 https://nvd.nist.gov/vuln/detail/CVE-2022-4338 [ 7 ] CVE-2023-1668 https://nvd.nist.gov/vuln/detail/CVE-2023-1668 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202311-16 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Virtualization Host security, bug fix and enhancement update (4.4.4-2) Advisory ID: RHSA-2021:0976-01 Product: Red Hat Virtualization Advisory URL: https://access.redhat.com/errata/RHSA-2021:0976 Issue date: 2021-03-23 CVE Names: CVE-2020-27827 ==================================================================== 1. Summary: An update for imgbased, redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: RHEL 8-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64 Red Hat Virtualization 4 Hypervisor for RHEL 8 - noarch 3. Description: The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.4.4), redhat-virtualization-host (4.4.4) Changes to the imgbased component: * Previously, the chronyd symlink was removed during the upgrade process. As a result, the chronyd service was disabled following the upgrade. In this release, the chronyd service is enabled after upgrade. (BZ#1903777) Security Fix(es): * lldp/openvswitch: denial of service via externally triggered memory leak (CVE-2020-27827) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/2974891 5. Bugs fixed (https://bugzilla.redhat.com/): 1903777 - chronyd is disabled after upgrading RHV-H 4.4.2 -> 4.4.3 1915877 - Rebase RHV-H 4.4.4 on RHEL 8.3.1 1916659 - Upgrade imgbased to 1.2.16 1921438 - CVE-2020-27827 lldp/openvswitch: denial of service via externally triggered memory leak 1932763 - Rebase RHV-H 4.4.4 on FDP 2.11 (21B) 6. Package List: Red Hat Virtualization 4 Hypervisor for RHEL 8: Source: redhat-virtualization-host-4.4.4-20210307.0.el8_3.src.rpm noarch: redhat-virtualization-host-image-update-4.4.4-20210307.0.el8_3.noarch.rpm RHEL 8-based RHEV-H for RHEV 4 (build requirements): Source: redhat-release-virtualization-host-4.4.4-2.el8ev.src.rpm noarch: redhat-virtualization-host-image-update-placeholder-4.4.4-2.el8ev.noarch.rpm x86_64: redhat-release-virtualization-host-4.4.4-2.el8ev.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-27827 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYFo5HtzjgjWX9erEAQhMtg//Wr6sNIkXoFWvB1Rf6IrjG6mumtZtQROR 7AucVC7FRmoyeqy+HiURXUdyBT4JiapEswPlEqI5Lg1s1pIfm0ONf4vf8CAXr6in u8T6LHR4rREldydYTFoW15KV7fl5O1pKV0m+xsmx6a8Ark9CZvA31x5rdexYEPHI GDjUOc7jh+CF+j+OGsA5mOLoEGTdxSX3j8Wr1rFuTDw+9ceIvddLAPXymc6NVhf7 5NCkRkcDeD/8PPjYYSBE+3c98uANPKGAb0HV+g20wZ46Qn7Jz+gLOYz7RrGDsGH0 yNzGdbZdovCdFkjNp852WswWzK3IK7Qrd3ow52mgweMlqxIMXJ/X7500D94DDiAs F1pkS+qKRdlR6RHfH5yuTBcugmTghDKkrt1+zsXdOja+/f5+Pc3JRIhz6wZIjEsC ZYezIyFhWjQHlkakmMRzdlFXboBNhBr5mGn7z2t0E2aoz/1j+tG7UbIp++HXFxqq 2hdIKGbCn/ETbKE5z3YEq+9Sndezg0GUsSpJTO2R8xre/O3P9bKdSphSF4e4gk0U CTjVTC1BrKUVQ5REb1trJqTHLHk6/igSg24Glez8ztE0WrKc2ncw0NYx8dDYtU7O XTrP6O6oPxU9zTd+22Dh5L/hVLsXndkBZSsoAdKoRBQ51P0WZlxNWObehIz3ZRhf Q5Xmbi8UbaY=QNMM -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Description: Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. The following advisory data is extracted from: https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9158.json Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. Description: LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices
VAR-202103-1784 No CVE ZTE Corporation ZXHN F412 has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
ZXHN F412 is a simple xPON HGU terminal used in FTTH scenarios. ZTE Corporation ZXHN F412 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.
VAR-202103-1798 No CVE ZTE Corporation ZXHN F612 has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
ZXHN F612 is a simple xPON HGU terminal used in FTTH scenarios. ZTE Corporation ZXHN F612 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.
VAR-202103-1802 No CVE ZTE Corporation ZXHN F452 has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
ZTE Corporation is the world's leading provider of integrated communications solutions. ZXHN F452 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.
VAR-202103-1806 No CVE Wuxi Kaiyun Information Technology Co., Ltd. has an information leakage vulnerability in its website construction system CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Wuxi Kaiyun Information Technology Co., Ltd. focuses on informatization construction, and uses the Internet, Internet of Things, artificial intelligence, big data and cloud computing technology to provide business consulting, solutions, and customized development for local science and technology associations, enterprises and social organizations. , Operation and maintenance and other information-based one-stop technical services, etc. Wuxi Kaiyun Information Technology Co., Ltd. has an information leakage vulnerability in its website building system. Attackers can use this vulnerability to obtain sensitive information.
VAR-202103-1669 No CVE New H3C Technology Co., Ltd. H3C ERG2-1350W router has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
H3C ERG2-1350W is a router of New H3C Technology Co., Ltd. New H3C Technology Co., Ltd. H3C ERG2-1350W router has a weak password vulnerability. Attackers can use the vulnerability to obtain sensitive information.
VAR-202103-1658 No CVE Shenzhen Meikexing Communication Technology Co., Ltd. YR1881XG has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
YR1881XG is a router. Shenzhen Meikexing Communication Technology Co., Ltd. YR1881XG has a denial of service vulnerability. Attackers can use this vulnerability to cause a denial of service by sending carefully constructed data packets.