VARIoT IoT vulnerabilities database

VAR-202010-1092 | CVE-2020-6371 | SAP NetWeaver Application Server ABAP Information Disclosure Vulnerability |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: Medium |
User enumeration vulnerability can be exploited to get a list of user accounts and personal user information can be exposed in SAP NetWeaver Application Server ABAP (POWL test application) versions - 710, 711, 730, 731, 740, 750, leading to Information Disclosure
VAR-202012-0507 | CVE-2020-25198 | Moxa Made NPort IAW5000A-I/O Multiple vulnerabilities in the series |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: High |
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has incorrectly implemented protections from session fixation, which may allow an attacker to gain access to a session and hijack it by stealing the user’s cookies. NPort IAW5000A-I/O The series is Moxa It is an industrial equipment provided by. NPort IAW5000A-I/O There are several vulnerabilities in the series: * Session immobilization (CWE-384) - CVE-2020-25198 * Inappropriate authority management (CWE-269) - CVE-2020-25194 * Weak password request (CWE-521) - CVE-2020-25153 * Sending important information in clear text (CWE-319) - CVE-2020-25190 * Insufficient limit on the number of authentication attempts (CWE-307) - CVE-2020-25196 * information leak (CWE-200) - CVE-2020-25192The expected impact depends on each vulnerability, but it may be affected as follows. * By a remote third party, Cookie Stealed and hijacked session - CVE-2020-25198 * Of the product Web Performs functions that require administrator privileges by general users who access the server - CVE-2020-25194 * User credentials with insufficient password strength can be easily guessed - CVE-2020-25153 * By a remote third party Web External service credentials stored on the server are stolen - CVE-2020-25190 * By brute force attack SSH Or Telnet Log in to the system via - CVE-2020-25196 * By a remote third party Web Sensitive information on the server is stolen - CVE-2020-25192.
The MOXA NPort IAW5000A-I/O Series 2.1 and earlier firmware has a session fixation vulnerability. Attackers can use this vulnerability to access and hijack sessions by stealing cookies from users. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to gain access to another user's session
VAR-202010-1161 | CVE-2020-7591 | SIPORT MP Authentication vulnerabilities in |
CVSS V2: 8.5 CVSS V3: 8.8 Severity: HIGH |
A vulnerability has been identified in SIPORT MP (All versions < 3.2.1). Vulnerable versions of the device could allow an authenticated attacker to impersonate other users of the system and perform (potentially administrative) actions on behalf of those users if the single sign-on feature ("Allow logon without password") is enabled. SIPORT MP Contains an authentication vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202010-1493 | CVE-2020-8345 | Lenovo Vantage for Lenovo HardwareScan Vulnerability in uncontrolled search path elements in plugins |
CVSS V2: 4.4 CVSS V3: 7.8 Severity: HIGH |
A DLL search path vulnerability was reported in the Lenovo HardwareScan Plugin for the Lenovo Vantage hardware scan feature prior to version 1.0.46.11 that could allow escalation of privilege. Lenovo Vantage for Lenovo HardwareScan The plugin contains a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Lenovo Vantage is a computer management application program of Lenovo Corporation in China. The program supports features such as driver updates, device status diagnostics, and computer configuration. There is a security vulnerability in the Lenovo hardware scanning plug-in. Attackers can use this vulnerability to escalate their privileges
VAR-202010-1492 | CVE-2020-8338 | Lenovo Diagnostics Untrusted search path vulnerabilities in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A DLL search path vulnerability was reported in Lenovo Diagnostics prior to version 4.35.4 that could allow a user with local access to execute code on the system. Lenovo Diagnostics Exists in an untrusted search path vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Lenovo Diagnostics is a tool for scanning and diagnosing hardware failures of Lenovo computers. This tool can help users scan, check, and repair computer driver problems. Lenovo Diagnostics can also help users easily solve some blue screen and crash problems on the computer and repair them. It can scan and diagnose faults with one click
VAR-202010-1650 | No CVE | Unauthorized access vulnerabilities in China Mobile Yu routing |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
China Mobile Yu Router is a router launched by China Mobile Communications Co., Ltd.
There are unauthorized access vulnerabilities in China Mobile Yu routing. Attackers can use vulnerabilities to obtain sensitive information (including broadband dial-up Internet user name and password, router login user name and password, Wi-Fi SSID, password, etc.).
VAR-202010-0506 | CVE-2020-26867 | ARC Informatique PcVue Untrusted Data Deserialization Vulnerability in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
ARC Informatique PcVue prior to version 12.0.17 is vulnerable due to the deserialization of untrusted data, which may allow an attacker to remotely execute arbitrary code on the web and mobile back-end server. ARC Informatique PcVue There is a vulnerability in deserialization of untrusted data.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pcvue is a multifunctional HMI-SCADA software of ARC Informatique, an integrated solution that can monitor all aspects of customer assets. PcVue is widely used in industrial control, building management, energy management, smart grid, energy distribution, substation automation, security/fire protection systems, public facilities, material handling, transportation, renewable energy, and infrastructure.
PcVue 8.10 and later versions have a remote code execution vulnerability. The vulnerability stems from a remote code execution vulnerability due to the unsafe deserialization of messages received on the interface. Attackers can use this vulnerability to execute code
VAR-202010-0507 | CVE-2020-26868 | ARC Informatique PcVue Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
ARC Informatique PcVue prior to version 12.0.17 is vulnerable to a denial-of-service attack due to the ability of an unauthorized user to modify information used to validate messages sent by legitimate web clients. This issue also affects third-party systems based on the Web Services Toolkit. ARC Informatique PcVue Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Pcvue is a multifunctional HMI-SCADA software of ARC Informatique, an integrated solution that can monitor all aspects of customer assets. PcVue is widely used in industrial control, building management, energy management, smart grid, energy distribution, substation automation, security/fire protection systems, public facilities, material handling, transportation, renewable energy, and infrastructure. An attacker can use this vulnerability to cause a denial of service
VAR-202010-0508 | CVE-2020-26869 | ARC Informatique PcVue information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
ARC Informatique PcVue prior to version 12.0.17 is vulnerable to information exposure, allowing unauthorized users to access session data of legitimate users. This issue also affects third-party systems based on the Web Services Toolkit. ARC Informatique PcVue Contains an information disclosure vulnerability.Information may be obtained. Pcvue is a multifunctional HMI-SCADA software of ARC Informatique, an integrated solution that can monitor all aspects of customer assets. PcVue is widely used in industrial control, building management, energy management, smart grid, energy distribution, substation automation, security/fire protection systems, public facilities, material handling, transportation, renewable energy, and infrastructure. No detailed vulnerability details are currently provided
VAR-202010-1195 | CVE-2020-5143 | SonicOS SSLVPN Vulnerability related to information leakage due to different responses to security-related processing on the login page of |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
SonicOS SSLVPN login page allows a remote unauthenticated attacker to perform firewall management administrator username enumeration based on the server responses. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0. SonicOS SSLVPN The login page of is vulnerable to information leakage due to the difference in response to security-related processing.Information may be obtained. SonicWall SonicOS SSLVPN NACagent is a VPN (Virtual Private Network) client application developed by SonicWall in the United States
VAR-202010-1194 | CVE-2020-5142 | SonicOS SSLVPN Cross-site scripting vulnerability in web interface |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A stored cross-site scripting (XSS) vulnerability exists in the SonicOS SSLVPN web interface. A remote unauthenticated attacker is able to store and potentially execute arbitrary JavaScript code in the firewall SSLVPN portal. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0. SonicWall SonicOS SSLVPN NACagent is a VPN (Virtual Private Network) client application developed by SonicWall in the United States
VAR-202010-1193 | CVE-2020-5141 | SonicOS Vulnerability regarding improper restriction of excessive authentication attempts in |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in SonicOS allows a remote unauthenticated attacker to brute force Virtual Assist ticket ID in the firewall SSLVPN service. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0. SonicOS Is vulnerable to improper restriction of excessive authentication attempts.Information may be obtained and information may be tampered with. SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States
VAR-202010-1192 | CVE-2020-5140 | SonicOS Out-of-bounds read vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS) on the firewall SSLVPN service by sending a malicious HTTP request that leads to memory addresses leak. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0. SonicOS Is vulnerable to an out-of-bounds read.Denial of service (DoS) It may be put into a state. SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States
VAR-202010-1191 | CVE-2020-5139 | SonicOS SSLVPN Vulnerability in freeing invalid pointers and references in services |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in SonicOS SSLVPN service allows a remote unauthenticated attacker to cause Denial of Service (DoS) due to the release of Invalid pointer and leads to a firewall crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0. SonicWall SonicOS SSLVPN NACagent is a VPN (Virtual Private Network) client application developed by SonicWall in the United States
VAR-202010-1190 | CVE-2020-5138 | SonicOS Out-of-bounds Vulnerability in Microsoft |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A Heap Overflow vulnerability in the SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS) on the firewall SSLVPN service and leads to SonicOS crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0. SonicOS Is vulnerable to an out-of-bounds write.Denial of service (DoS) It may be put into a state. SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States
VAR-202010-1189 | CVE-2020-5137 | SonicOS Buffer Overflow Vulnerability in Linux |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A buffer overflow vulnerability in SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS) on the firewall SSLVPN service and leads to firewall crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0. SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States
VAR-202010-1188 | CVE-2020-5136 | SonicOS Buffer Overflow Vulnerability in Linux |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A buffer overflow vulnerability in SonicOS allows an authenticated attacker to cause Denial of Service (DoS) in the SSL-VPN and virtual assist portal, which leads to a firewall crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0. SonicOS Contains a classic buffer overflow vulnerability.Denial of service (DoS) It may be put into a state. SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States. SonicOS has a buffer error vulnerability. v and seventh generation version 7.0.0.0
VAR-202010-1187 | CVE-2020-5135 | SonicOS Buffer Overflow Vulnerability in Linux |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a malicious request to the firewall. This vulnerability affected SonicOS Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0. SonicOS Contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States
VAR-202010-1186 | CVE-2020-5134 | SonicOS Out-of-bounds read vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in SonicOS allows an authenticated attacker to cause out-of-bound invalid file reference leads to a firewall crash. This vulnerability affected SonicOS Gen 6 version 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0. SonicOS Is vulnerable to an out-of-bounds read.Denial of service (DoS) It may be put into a state. SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States
VAR-202010-1185 | CVE-2020-5133 | SonicOS Buffer Overflow Vulnerability in Linux |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in SonicOS allows a remote unauthenticated attacker to cause Denial of Service due to buffer overflow, which leads to a firewall crash. This vulnerability affected SonicOS Gen 6 version 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0. SonicOS Contains a classic buffer overflow vulnerability.Denial of service (DoS) It may be put into a state. SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States