VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202007-0047 CVE-2020-10920 C-More HMI EA9 access control error vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
This vulnerability allows remote attackers to execute arbitrary code on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the control service, which listens on TCP port 9999 by default. The issue results from the lack of authentication prior to allowing alterations to the system configuration. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-10493. Zero Day Initiative To this vulnerability ZDI-CAN-10493 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. C-More HMI EA9 is a human-machine interface touch panel
VAR-202007-0048 CVE-2020-10921 C-MORE HMI EA9 Vulnerability in lack of authentication for critical features in firmware CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
This vulnerability allows remote attackers to issue commands on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the EA-HTTP.exe process. The issue results from the lack of authentication prior to allowing alterations to the system configuration. An attacker can leverage this vulnerability to issue commands to the physical equipment controlled by the device. Was ZDI-CAN-10482. Zero Day Initiative To this vulnerability ZDI-CAN-10482 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. C-More HMI EA9 is a human-machine interface touch panel. The EA-HTTP.exe process in C-More HMI EA9 has an access control error vulnerability
VAR-202007-0644 CVE-2020-15350 RIOT Classic buffer overflow vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
RIOT 2020.04 has a buffer overflow in the base64 decoder. The decoding function base64_decode() uses an output buffer estimation function to compute the required buffer capacity and validate against the provided buffer size. The base64_estimate_decode_size() function calculates the expected decoded size with an arithmetic round-off error and does not take into account possible padding bytes. Due to this underestimation, it may be possible to craft base64 input that causes a buffer overflow. RIOT Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. RIOT RIOT-OS is a set of operating systems used in the field of Internet of Things. Remote attackers can use this vulnerability to execute arbitrary code on the system with the help of specially crafted parameters
VAR-202007-0029 CVE-2020-10605 Grundfos CIM 500 access control error vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: High
Grundfos CIM 500 before v06.16.00 responds to unauthenticated requests for password storage files. Grundfos Provided by the company CIM 500 Is Grundfos This is an expansion module that enables data communication using Ethernet in the equipment manufactured by the manufacturer. CIM 500 The following multiple vulnerabilities exist in. * Lack of authentication for important features (CWE-306) - CVE-2020-10605 * Plaintext storage of authentication information (CWE-256) - CVE-2020-10609The expected impact depends on each vulnerability, but it may be affected as follows. * A remote third party accesses the file containing the password - CVE-2020-10605 * Since the authentication information is stored in plain text in the product, a third party who can access the product can steal sensitive information or change system settings. - CVE-2020-10609. Grundfos CIM 500 is an Ethernet module of Danish Grundfos company. There is an access control error vulnerability in versions prior to Grundfos CIM 500 v06.16.00
VAR-202007-0032 CVE-2020-10609 Grundfos Made CIM 500 Multiple vulnerabilities in CVSS V2: 5.0
CVSS V3: 7.5
Severity: High
Grundfos CIM 500 v06.16.00 stores plaintext credentials, which may allow sensitive information to be read or allow modification to system settings by someone with access to the device. Grundfos Provided by the company CIM 500 Is Grundfos This is an expansion module that enables data communication using Ethernet in the equipment manufactured by the manufacturer. CIM 500 The following multiple vulnerabilities exist in. * Lack of authentication for important features (CWE-306) - CVE-2020-10605 * Plaintext storage of authentication information (CWE-256) - CVE-2020-10609The expected impact depends on each vulnerability, but it may be affected as follows. * A remote third party accesses the file containing the password - CVE-2020-10605 * Since the authentication information is stored in plain text in the product, a third party who can access the product can steal sensitive information or change system settings. - CVE-2020-10609. Grundfos CIM 500 is an Ethernet module of Danish Grundfos company. There was a security vulnerability in Grundfos CIM 500 v06.16.00 before version, which was caused by the program storing credentials in clear text. Attackers can use this vulnerability to read sensitive information or modify system configuration
VAR-202007-1226 CVE-2020-5598 Made by Mitsubishi Electric GOT2000 Of the series TCP/IP Multiple vulnerabilities in functionality CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper access control vulnerability, which may which may allow a remote attacker tobypass access restriction and stop the network functions of the products or execute a malicious program via a specially crafted packet. Mitsubishi Electric GT27, etc. are all a GOT2000 series graphical operation terminal of Japan's Mitsubishi Electric. CoreOS Y and earlier versions of Mitsubishi Electric GT27, GT25, and GT23 (GOT2000 series) have an access control error vulnerability. Attackers can use this vulnerability to access sensitive resources, causing denial of service and device crashes
VAR-202007-1228 CVE-2020-5600 Made by Mitsubishi Electric GOT2000 Of the series TCP/IP Multiple vulnerabilities in functionality CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains a resource management error vulnerability, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. Mitsubishi Electric GT27, etc. are all a GOT2000 series graphical operation terminal of Japan's Mitsubishi Electric. CoreOS Y and previous versions of Mitsubishi Electric GT27, GT25, and GT23 (GOT2000 series) have a resource management error vulnerability. Attackers can use this vulnerability to obtain sensitive information
VAR-202007-1224 CVE-2020-5596 Made by Mitsubishi Electric GOT2000 Of the series TCP/IP Multiple vulnerabilities in functionality CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) does not properly manage sessions, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. Mitsubishi Electric GT27, etc. are all a GOT2000 series of graphic operation terminals from Mitsubishi Electric of Japan. CoreOS Y and previous versions in Mitsubishi Electric GT27, GT25, and GT23 (GOT2000 series) have authorization issue vulnerabilities. Attackers can use this vulnerability to cause TCP connection failure
VAR-202007-1225 CVE-2020-5597 Made by Mitsubishi Electric GOT2000 Of the series TCP/IP Multiple vulnerabilities in functionality CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains a null pointer dereference vulnerability, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. Mitsubishi Electric GT27, etc. are all a GOT2000 series graphical operation terminal of Japan's Mitsubishi Electric. CoreOS Y and previous versions of Mitsubishi Electric GT27, GT25, and GT23 (GOT2000 series) have a null pointer reference vulnerability. Attackers can use this vulnerability to cause denial of service and device crash
VAR-202007-1227 CVE-2020-5599 Made by Mitsubishi Electric GOT2000 Of the series TCP/IP Multiple vulnerabilities in functionality CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. Mitsubishi Electric GT27, etc. are all a GOT2000 series graphical operation terminal of Japan's Mitsubishi Electric. CoreOS Y and previous versions in Mitsubishi Electric GT27, GT25 and GT23 (GOT2000 series) have an injection vulnerability, which can be exploited by attackers to cause a denial of service
VAR-202007-1223 CVE-2020-5595 Made by Mitsubishi Electric GOT2000 Of the series TCP/IP Multiple vulnerabilities in functionality CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains a buffer overflow vulnerability, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. Mitsubishi Electric GT27, etc. are all a GOT2000 series of graphic operation terminals from Mitsubishi Electric of Japan. CoreOS Y and earlier versions in Mitsubishi Electric GT27, GT25, and GT23 (GOT2000 series) have a buffer overflow vulnerability. Attackers can use this vulnerability to cause the device to crash and execute code
VAR-202007-0046 CVE-2020-10919 C-MORE HMI EA9 In firmware Vulnerability in using weak password encryption CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
This vulnerability allows remote attackers to disclose sensitive information on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. When transmitting passwords, the process encrypts them in a recoverable format. An attacker can leverage this vulnerability to disclose credentials, leading to further compromise. Was ZDI-CAN-10185. C-MORE HMI EA9 There is a vulnerability in the firmware regarding the use of weak password encryption. Zero Day Initiative To this vulnerability ZDI-CAN-10185 Was numbered.Information may be obtained. C-More HMI EA9 is a human-machine interface touch panel
VAR-202007-0920 CVE-2020-15509 Nordic Semiconductor Android BLE Library and DFU Library Vulnerability regarding lack of encryption of critical data in CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
Nordic Semiconductor Android BLE Library through 2.2.1 and DFU Library through 1.10.4 for Android (as used by nRF Connect and other applications) can engage in unencrypted communication while showing the user that the communication is purportedly encrypted. The problem is in bond creation (e.g., internalCreateBond in BleManagerHandler)
VAR-202007-0879 CVE-2020-15582 Samsung mobile Classic buffer overflow vulnerability in device CVSS V2: 4.3
CVSS V3: 5.5
Severity: MEDIUM
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (Exynos 7885 chipsets) software. The Bluetooth Low Energy (BLE) component has a buffer overflow with a resultant deadlock or crash. The Samsung ID is SVE-2020-16870 (July 2020). Samsung mobile A classic buffer overflow vulnerability exists on the device. This vulnerability is Samsung ID: SVE-2020-16870 It is published as.Service operation interruption (DoS) It may be put into a state
VAR-202007-1471 No CVE Centreon XSS vulnerability CVSS V2: 4.6
CVSS V3: -
Severity: MEDIUM
Centreon (Merethis Centreon) is a set of open source system monitoring tools from Centreon, France. An XSS vulnerability exists in Centreon, which can be exploited by attackers to obtain information disclosure such as cook.
VAR-202007-1477 No CVE Xiaomi Mi 6 has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Xiaomi Mi 6 is a flagship device officially released by Xiaomi on April 19, 2017. There is a denial of service vulnerability in Xiaomi Mi 6 mobile phone, which can be exploited by an attacker to cause the device to crash.
VAR-202007-1492 No CVE Hammer Technology Nut Pro 2 mobile phone has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Nut Pro 2 is a new mobile phone released by Hammer Technology at the 2017 Hammer Technology Autumn New Product Launch Conference on November 7, 2017. Hammer Technology Nut Pro 2 mobile phone has a denial of service vulnerability. Attackers can use this vulnerability to occupy system and device resources, causing the device to crash and become unusable.
VAR-202007-1257 CVE-2020-9395 plural Realtek Classic buffer overflow vulnerability in the product CVSS V2: 4.9
CVSS V3: 8.0
Severity: HIGH
An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer. plural Realtek The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Realtek RTL8195AM, etc. are all an IoT microcontroller of Taiwan Realtek Semiconductor (Realtek). A buffer error vulnerability exists in many Realtek products. Remote attackers can use this vulnerability to execute arbitrary code on the system with the help of a specially crafted EAPOL-Key packet. The following products and versions are affected: Realtek RTL8195AM before 2.0.6; RTL8711AM before 2.0.6; RTL8711AF before 2.0.6; RTL8710AF before 2.0.6
VAR-202007-0976 CVE-2020-1836 Huawei P30 and P30 Pro information disclosure vulnerability CVSS V2: 2.9
CVSS V3: 5.3
Severity: MEDIUM
HUAWEI P30 with versions earlier than 10.1.0.160(C00E160R2P11) and HUAWEI P30 Pro with versions earlier than 10.1.0.160(C00E160R2P8) have an information disclosure vulnerability. Certain function's default configuration in the system seems insecure, an attacker should craft a WI-FI hotspot to launch the attack. Successful exploit could cause information disclosure. Attackers can use this vulnerability to obtain information by forging a WI-FI hotspot
VAR-202007-1283 CVE-2020-5372 Dell EMC PowerStore Unauthorized authentication vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Dell EMC PowerStore versions prior to 1.0.1.0.5.002 contain a vulnerability that exposes test interface ports to external network. A remote unauthenticated attacker could potentially cause Denial of Service via test interface ports which are not used during run time environment. Dell EMC PowerStore Exists in a fraudulent authentication vulnerability.Information may be obtained. Dell EMC PowerStore is a storage device of Dell (Dell) in the United States