VARIoT IoT vulnerabilities database
| VAR-202103-1648 | No CVE | XINJE XL5E-16T has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
XINJE XL5E-16T PLC unit is a series of Ethernet controller products.
XINJE XL5E-16T has a denial of service vulnerability. An attacker can use this vulnerability to cause the device to fail to work normally.
| VAR-202103-1652 | No CVE | D-Link Electronic Equipment (Shanghai) Co., Ltd. DIR-878 has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
D-Link Electronic Equipment (Shanghai) Co., Ltd. is a company mainly engaged in network equipment, wireless equipment, switches and other projects.
D-Link Electronic Equipment (Shanghai) Co., Ltd. DIR-878 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202103-1653 | No CVE | SIEMENS SCALANCE X208 has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
SCALANCE X208 is a Siemens switch.
SIEMENS SCALANCE X208 has a denial of service vulnerability, which can be exploited by an attacker to cause the device to fail to work normally.
| VAR-202103-1654 | No CVE | Advantech EKI-1524 has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
EKI-1524 is a serial device networking server.
Advantech EKI-1524 has a denial of service vulnerability, which can be exploited by an attacker to cause the device to automatically restart.
| VAR-202103-1655 | No CVE | XINJE XDME-30T4-E Ethernet protocol has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
XINJE XDME-30T4-E is a controller product of the Ethernet series.
XINJE XDME-30T4-E Ethernet protocol has a denial of service vulnerability. Attackers can use this vulnerability to cause the device to crash and not work properly.
| VAR-202103-1322 | CVE-2021-25252 | plural Trend Micro Resource depletion vulnerability in the product |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: Medium |
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file. plural Trend Micro The product contains a resource depletion vulnerability.Denial of service (DoS) It may be put into a state
| VAR-202103-1589 | CVE-2021-1470 | Cisco Systems Cisco Catalyst SD-WAN Manager Input verification vulnerability in |
CVSS V2: - CVSS V3: 4.9 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability is due to improper input validation of SQL queries to an affected system. An attacker could exploit this vulnerability by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the vManage database or the underlying operating system.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. Cisco Systems Cisco Catalyst SD-WAN Manager There is an input validation vulnerability in.Information may be tampered with
| VAR-202103-1626 | CVE-2021-1462 | Cisco Systems Cisco Catalyst SD-WAN Manager Input verification vulnerability in |
CVSS V2: - CVSS V3: 4.4 Severity: MEDIUM |
A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to elevate privileges on an affected system. To exploit this vulnerability, an attacker would need to have a valid Administrator account on an affected system.
The vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to an affected system with an Administrator account and creating a malicious file, which the system would parse at a later time. A successful exploit could allow the attacker to obtain root privileges on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Systems Cisco Catalyst SD-WAN Manager There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202103-1606 | CVE-2021-1232 | Cisco Systems Cisco Catalyst SD-WAN Manager Vulnerability regarding insufficient protection of authentication information in |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying filesystem of an affected system.
This vulnerability is due to insufficient access control for sensitive information that is written to an affected system. An attacker could exploit this vulnerability by accessing sensitive information that they are not authorized to access on an affected system. A successful exploit could allow the attacker to gain access to devices and other network management systems that they should not have access to.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Systems Cisco Catalyst SD-WAN Manager There are vulnerabilities in inadequate protection of credentials.Information may be obtained
| VAR-202103-1605 | CVE-2021-1466 | Cisco Systems Cisco Catalyst SD-WAN Manager Input verification vulnerability in |
CVSS V2: - CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability in the vDaemon service of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to cause a buffer overflow on an affected system, resulting in a denial of service (DoS) condition.
The vulnerability is due to incomplete bounds checks for data that is provided to the vDaemon service of an affected system. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on the affected system. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could allow the attacker to cause the vDaemon listening service to reload and result in a DoS condition.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Systems Cisco Catalyst SD-WAN Manager There is an input validation vulnerability in.Information is tampered with and service operation is interrupted (DoS) It may be in a state
| VAR-202103-1603 | CVE-2021-1465 | Cisco Systems Cisco Catalyst SD-WAN Manager Past traversal vulnerability in |
CVSS V2: - CVSS V3: 4.3 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a directory traversal attack and obtain read access to sensitive files on an affected system.
The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to write arbitrary files on the affected system. Cisco Systems Cisco Catalyst SD-WAN Manager Exists in a past traversal vulnerability.Information may be obtained
| VAR-202103-1602 | CVE-2021-1464 | Cisco Systems Cisco Catalyst SD-WAN Manager Input verification vulnerability in |
CVSS V2: - CVSS V3: 5.0 Severity: MEDIUM |
A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization checking and gain restricted access to the configuration information of an affected system.
This vulnerability exists because the affected software has insufficient input validation for certain commands. An attacker could exploit this vulnerability by sending crafted requests to the affected commands of an affected system. A successful exploit could allow the attacker to bypass authorization checking and gain restricted access to the configuration data of the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability
| VAR-202103-1591 | CVE-2021-1379 | Cisco IP Phone Security hole |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
Multiple vulnerabilities in the Cisco Discovery Protocol and Link Layer Discovery Protocol (LLDP) implementations for Cisco IP Phone Series 68xx/78xx/88xx could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP phone.
These vulnerabilities are due to missing checks when the IP phone processes a Cisco Discovery Protocol or LLDP packet. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted IP phone. A successful exploit could allow the attacker to execute code on the affected IP phone or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition.Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
| VAR-202103-1635 | No CVE | Shenzhen Meikexing Communication Technology Co., Ltd. X188G has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
X188G is a router.
Shenzhen Meikexing Communication Technology Co., Ltd. X188G has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202103-1636 | No CVE | Multiple gateways of China Mobile Communications Co., Ltd. have a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The business scope of China Mobile Communications Co., Ltd. includes: IP telephony business; Internet access service business, Internet backbone network data transmission business; engaged in the design of mobile communications, IP telephony and Internet networks.
Multiple gateways of China Mobile Communications Co., Ltd. have a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202103-1588 | CVE-2021-27414 | Ellipse Enterprise Asset Management Cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
An attacker could trick a user of Hitachi ABB Power Grids Ellipse Enterprise Asset Management (EAM) versions prior to and including 9.0.25 into visiting a malicious website posing as a login page for the Ellipse application and gather authentication credentials. Ellipse Enterprise Asset Management (Ellipse EAM) is a business process management software Ellipse application provided by Ellipse in the UK. There is a cross-site scripting vulnerability. The browser runs these codes
| VAR-202103-1587 | CVE-2021-27416 | Ellipse Enterprise Asset Management Cross-site scripting vulnerability |
CVSS V2: 5.8 CVSS V3: 5.4 Severity: MEDIUM |
An attacker could exploit this vulnerability in Hitachi ABB Power Grids Ellipse Enterprise Asset Management (EAM) versions prior to and including 9.0.25 by tricking a user to click on a link containing malicious code that would then be run by the web browser. This can result in the compromise of confidential information, or even the takeover of the user’s session. Ellipse Enterprise Asset Management (Ellipse EAM) is a business process management software provided by Ellipse Industrial Equipment in the UK
| VAR-202103-0638 | CVE-2021-21514 | Dell EMC OpenManage Server Administrator Traversal Vulnerability in Japan |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
Dell EMC OpenManage Server Administrator (OMSA) versions 9.5 and prior contain a path traversal vulnerability. A remote user with admin privileges could potentially exploit this vulnerability to view arbitrary files on the target system by sending a specially crafted URL request. The solution supports online diagnosis, system operation detection, equipment management, etc
| VAR-202103-0637 | CVE-2021-21513 | Dell EMC OpenManage Server Administrator Authentication vulnerabilities in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Dell EMC OpenManage Server Administrator (OMSA) version 9.5 Microsoft Windows installations with Distributed Web Server (DWS) enabled configuration contains an authentication bypass vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to gain admin access on the affected system. DELL Dell EMC OpenManage Server Administrator is a set of system management solutions from DELL Corporation in the United States. The solution supports online diagnosis, system operation detection, equipment management, etc. Microsoft Windows is a desktop operating system of Microsoft Corporation in the United States
| VAR-202103-0511 | CVE-2021-22294 | HarmonyOS Vulnerability in |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
A component API of the HarmonyOS 2.0 has a permission bypass vulnerability. Local attackers may exploit this vulnerability to issue commands repeatedly, exhausting system service resources. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system