VARIoT IoT vulnerabilities database

VAR-202010-1498 | CVE-2020-9990 | Apple macOS process_token_SetFence Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability |
CVSS V2: 6.9 CVSS V3: 7.8 Severity: HIGH |
A race condition was addressed with additional validation. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with kernel privileges. This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the AppleIntelKBLGraphics kernel extension. The issue results from the lack of proper locking when performing operations on an object. Apple OS X is a set of dedicated operating systems developed by Apple for Mac computers. Apple macOS could allow a local authenticated malicious user to gain elevated privileges on the system, caused by a time-of-check time-of-use race condition in the AppleIntelKBLGraphics kernel extension
VAR-202010-1630 | No CVE | Suzhou Inovance Technology Co., Ltd. AM600 Modbus has a buffer overflow vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
AM600 is a medium-sized programmable logic controller (PLC) designed with a modular structure.
Suzhou Inovance Technology Co., Ltd. AM600 has a buffer overflow vulnerability. The attacker sent malformed Modbus data packets, causing abnormalities inside the PLC and crashing the program.
VAR-202010-1641 | No CVE | Shanghai ZLAN Information Technology Co., Ltd. ZLAN7144N2 has an information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shanghai ZLAN Information Technology Co., Ltd. is a high-tech enterprise that provides industrial IoT solutions. It was established in 2008. Its products include serial server, IoT chips, serial to Ethernet, etc.
Shanghai ZLAN Information Technology Co., Ltd. ZLAN7144N2 has an information disclosure vulnerability. An attacker can use the vulnerability to send a specific message to the UDP port through the network to obtain the WiFi hotspot connection password of the device.
VAR-202010-1631 | No CVE | Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air-conditioning network monitoring alarm terminal has unauthorized access vulnerabilities |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
The precision air conditioner network monitoring terminal is an intelligent network monitoring device based on precision air conditioners, which is connected to the network through a network cable, and continuously collects air conditioner operating status data.
Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air-conditioning network monitoring and alarm terminal has an unauthorized access vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202010-1632 | No CVE | Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air-conditioning network monitoring alarm terminal has file upload vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The precision air conditioner network monitoring terminal is an intelligent network monitoring device based on precision air conditioners, which is connected to the network through a network cable, and continuously collects air conditioner operating status data.
Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air-conditioning network monitoring and alarm terminal has a file upload vulnerability. Attackers can use this vulnerability to gain server control rights.
VAR-202010-1633 | No CVE | Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air conditioner network monitoring and alarm terminal has file upload vulnerability (CNVD-2020-57687) |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The precision air conditioner network monitoring terminal is an intelligent network monitoring device based on precision air conditioners, which is connected to the network through a network cable, and continuously collects air conditioner operating status data.
Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air-conditioning network monitoring and alarm terminal has a file upload vulnerability. Attackers can use this vulnerability to gain server control rights.
VAR-202010-1634 | No CVE | Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air conditioner network monitoring and alarm terminal has file upload vulnerability (CNVD-2020-57686) |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The precision air conditioner network monitoring terminal is an intelligent network monitoring device based on precision air conditioners, which is connected to the network through a network cable, and continuously collects air conditioner operating status data.
Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air-conditioning network monitoring and alarm terminal has a file upload vulnerability. Attackers can use this vulnerability to gain server control rights.
VAR-202010-1627 | No CVE | H3C Magic R2+ProG router has unauthorized access vulnerability |
CVSS V2: 3.6 CVSS V3: - Severity: LOW |
H3C Magic R2+ is a wireless dual-band router specially designed by New H3C Technology Co., Ltd.
H3C Magic R2+ProG router has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202010-0890 | CVE-2020-26183 | Dell EMC NetWorker Vulnerability in externally accessible files or directories in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Dell EMC NetWorker versions prior to 19.3.0.2 contain an improper authorization vulnerability. Certain remote users with low privileges may exploit this vulnerability to perform 'nsrmmdbd' operations in an unintended manner. The software provides backup and recovery, deduplication, backup reporting, and more
VAR-202010-0889 | CVE-2020-26182 | Dell EMC NetWorker Vulnerability in externally accessible files or directories in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Dell EMC NetWorker versions prior to 19.3.0.2 contain an incorrect privilege assignment vulnerability. A non-LDAP remote user with low privileges may exploit this vulnerability to perform 'saveset' related operations in an unintended manner. The vulnerability is not exploitable by users authenticated via LDAP. The software provides backup and recovery, deduplication, backup reporting, and more
VAR-202010-0711 | CVE-2020-1677 | Juniper Networks Mist Cloud UI Input confirmation vulnerability |
CVSS V2: 4.3 CVSS V3: 7.2 Severity: MEDIUM |
When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle child elements in SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. It provides services across public and private clouds, Docker container and KVM Hypervisor servers provide cost and usage reports, RBAC , management, provisioning, orchestration, monitoring and automation. The following products and versions are affected: 2020 Year 9 moon 2 version before date
VAR-202010-0710 | CVE-2020-1676 | Juniper Networks Mist Cloud UI Vulnerability in handling exceptional conditions in |
CVSS V2: 4.3 CVSS V3: 7.2 Severity: HIGH |
When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. It provides cost and usage reporting, RBAC, management, provisioning, orchestration, monitoring and automation for servers across public and private clouds, Docker containers and KVM hypervisors. The following products and versions are affected: Versions before September 2, 2020
VAR-202010-0406 | CVE-2020-1675 | Juniper Networks Mist Cloud UI Authentication vulnerabilities in |
CVSS V2: 4.3 CVSS V3: 8.3 Severity: MEDIUM |
When Security Assertion Markup Language (SAML) authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly process invalid authentication certificates which could allow a malicious network-based user to access unauthorized data. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. It provides cost and usage reporting, RBAC, management, provisioning, orchestration, monitoring and automation for servers across public and private clouds, Docker containers and KVM hypervisors. The following products and versions are affected: Versions before September 2, 2020. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass access restrictions
VAR-202102-0294 | CVE-2020-25161 | Advantech Made WebAccess/SCADA Filename and pathname external control vulnerabilities |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
The WADashboard component of WebAccess/SCADA Versions 9.0 and prior may allow an attacker to control or influence a path used in an operation on the filesystem and remotely execute code as an administrator. Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the WADashboard component. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There are security vulnerabilities in WebAccess/SCADA WADashboard version 9.0 and earlier versions
VAR-202010-1625 | No CVE | A Binary Vulnerability in ScreenEditor of Delta Electronics Industry Co., Ltd. (CNVD-2020-56009) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Delta Electronics was established in 1971 to provide power management and cooling solutions worldwide. ScreenEditor is a configuration software in Delta CNCSoft software suite.
The ScreenEditor of Delta Electronics Industry Co., Ltd. has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202010-1626 | No CVE | Binary Vulnerability in ScreenEditor of Delta Electronics Industry Co., Ltd. |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Delta Electronics was established in 1971 to provide power management and cooling solutions worldwide. ScreenEditor is a configuration software in Delta CNCSoft software suite.
The ScreenEditor of Delta Electronics Industry Co., Ltd. has a binary vulnerability that can be exploited by attackers to cause a denial of service.
VAR-202010-1635 | No CVE | Binary Vulnerability in WebAccess/SCADA of Advantech (China) Co., Ltd. |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Advantech WebAccess SCADA is a HMI/SCADA monitoring software based entirely on IE browser.
Advantech (China) Co., Ltd. has a binary vulnerability in WebAccess/SCADA. Attackers can use the vulnerability to cause a denial of service.
VAR-202010-1637 | No CVE | Rockwell Automation 1769-L33ER has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Rockwell Automation is an industrial automation and information company.
Rockwell Automation 1769-L33ER has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202010-0741 | CVE-2020-1689 | Juniper Networks Junos OS Resource Depletion Vulnerability |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: LOW |
On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in a Virtual Chassis configuration, receipt of a stream of specific layer 2 frames can cause high CPU load, which could lead to traffic interruption. This issue does not occur when the device is deployed in Stand Alone configuration. The offending layer 2 frame packets can originate only from within the broadcast domain where the device is connected. This issue affects Juniper Networks Junos OS on EX4300-MP Series, EX4600 Series and QFX5K Series: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2. Juniper Networks Junos OS Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state.
Junos OS EX/QFX has a security loophole in the processing of via Virtual Chassis. Remote attackers can use this loophole to submit special requests, perform denial of service attacks, and crash the service program
VAR-202010-1437 | CVE-2020-4636 | IBM Resilient OnPrem Command injection vulnerability |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: High |
IBM Resilient OnPrem 38.2 could allow a privileged user to inject malicious commands through Python3 scripting. IBM X-Force ID: 185503. IBM Resilient OnPrem Contains a command injection vulnerability. Vendor exploits this vulnerability IBM X-Force ID: 185503 Is published as.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state