VARIoT IoT vulnerabilities database

VAR-202008-0132 | CVE-2020-13470 | Gigadevice GD32F103 and GD32F130 Vulnerability in leaking resources to incorrect area on device |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
Gigadevice GD32F103 and GD32F130 devices allow physical attackers to extract data via the probing of easily accessible bonding wires and de-obfuscation of the observed data. Gigadevice GD32F103 and GD32F130 The device contains a vulnerability related to the leakage of resources to the wrong area.Information may be tampered with
VAR-202008-0768 | CVE-2020-24363 | TP-Link TL-WA855RE Vulnerability regarding lack of authentication for critical features in |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
TP-Link TL-WA855RE V5 20200415-rel37464 devices allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password. TP-Link TL-WA855RE There is a vulnerability in the lack of authentication for critical features.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. TP-Link TL-WA855RE is a 300Mbps Wi-Fi range extender.
TP-Link TL-WA855RE V5 20200415-rel37464 has a privilege escalation vulnerability
VAR-202008-1033 | CVE-2020-7524 | Modicon M218 Logic Controller Out-of-bounds write vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Out-of-bounds Write vulnerability exists in Modicon M218 Logic Controller (V5.0.0.7 and prior) which could cause Denial of Service when sending specific crafted IPV4 packet to the controller: Sending a specific IPv4 protocol package to Schneider Electric Modicon M218 Logic Controller can cause IPv4 devices to go down. The device does not work properly and must be powered back on to return to normal. Modicon M218 Logic Controller Is vulnerable to out-of-bounds writes.Service operation interruption (DoS) It may be put into a state
VAR-202008-1036 | CVE-2020-7527 | SoMove Vulnerability regarding improper default permissions in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Incorrect Default Permission vulnerability exists in SoMove (V2.8.1) and prior which could cause elevation of privilege and provide full access control to local system users to SoMove component and services when a SoMove installer script is launched. SoMove There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. SoMove is a PC-oriented user-friendly setting software for setting up a variety of Schneider Electric motor control equipment.
SoMove 2.8.1 and earlier versions have permission error vulnerabilities
VAR-202008-0329 | CVE-2020-15687 | ACRN Project Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Missing access control restrictions in the Hypervisor component of the ACRN Project (v2.0 and v1.6.1) allow a malicious entity, with root access in the Service VM userspace, to abuse the PCIe assign/de-assign Hypercalls via crafted ioctls and payloads. This attack results in a corrupt state and Denial of Service (DoS) for previously assigned PCIe devices to the Service VM at runtime. ACRN Project There is an unspecified vulnerability in.Service operation interruption (DoS) It may be put into a state. ACRN is an open source virtual machine monitor for the Internet of Things.
A security vulnerability exists in the Hypervisor component of the ACRN project
VAR-202008-1032 | CVE-2020-7523 | Schneider Electric Modbus Privilege management vulnerability in serial driver |
CVSS V2: 4.4 CVSS V3: 7.8 Severity: HIGH |
Improper Privilege Management vulnerability exists in Schneider Electric Modbus Serial Driver (see security notification for versions) which could cause local privilege escalation when the Modbus Serial Driver service is invoked. The driver does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. (DoS) It may be put into a state. Schneider Electric Modbus Serial Driver is a serial driver of French Schneider Electric (Schneider Electric)
VAR-202008-0041 | CVE-2020-13594 | ESP-IDF Input confirmation vulnerability |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
The Bluetooth Low Energy (BLE) controller implementation in Espressif ESP-IDF 4.2 and earlier (for ESP32 devices) does not properly restrict the channel map field of the connection request packet on reception, allowing attackers in radio range to cause a denial of service (crash) via a crafted packet. ESP-IDF Is vulnerable to input validation.Denial of service (DoS) It may be put into a state. Espressif ESP-IDF is a development framework for the Internet of Things of China Espressif.
Espressif ESP-IDF 4.2 and earlier versions have security vulnerabilities. Attackers use specially crafted data packets to cause denial of service
VAR-202008-1324 | No CVE | ABB industrial robot teach pendant has encryption algorithm vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ABB (China) Co., Ltd. is committed to providing solutions for customers in the industrial, energy, power, transportation and construction industries.
The ABB industrial robot teach pendant has an encryption algorithm vulnerability. Attackers can use the loopholes to crack the user password of ABB industrial robots.
VAR-202008-1326 | No CVE | 1GE+WIFI router has command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
DIGISOL provides a complete integrated communication system solution.
1GE+WIFI router has command execution vulnerability. Attackers can log in to the background with a weak password and execute commands remotely.
VAR-202008-1270 | No CVE | Advantech WebAccess/SCADA has an information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an information disclosure vulnerability. Attackers can use vulnerabilities to obtain remote connection passwords, background administrator passwords and other sensitive information.
VAR-202008-1272 | No CVE | Advantech WebAccess/SCADA has command execution vulnerability (CNVD-2020-48616) |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.
VAR-202008-1295 | No CVE | Advantech WebAccess/SCADA has an information disclosure vulnerability (CNVD-2020-48622) |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an information disclosure vulnerability. Attackers can use vulnerabilities to obtain remote connection passwords, background administrator passwords and other sensitive information.
VAR-202008-1296 | No CVE | Advantech WebAccess/SCADA has logic flaw vulnerability (CNVD-2020-48617) |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has logic flaws. Attackers can use the vulnerability to access and modify the registry of the user's system, and can execute arbitrary commands on the user's system.
VAR-202008-1297 | No CVE | Advantech WebAccess/SCADA has command execution vulnerability (CNVD-2020-48618) |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.
VAR-202008-1298 | No CVE | Advantech WebAccess/SCADA has command execution vulnerability (CNVD-2020-48619) |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.
VAR-202008-1299 | No CVE | Advantech WebAccess/SCADA has logic flaw vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has logic flaws. Attackers can use the vulnerability to access and modify the registry of the user's system, and can execute arbitrary commands on the user's system.
VAR-202008-1300 | No CVE | Advantech WebAccess/SCADA has command execution vulnerability (CNVD-2020-48621) |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.
VAR-202008-1301 | No CVE | Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-48623) |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
VAR-202008-1302 | No CVE | Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-48624) |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
VAR-202008-0997 | CVE-2020-5621 | plural NETGEAR Cross-site request forgery vulnerability in switching hubs |
CVSS V2: 4.3 CVSS V3: 4.3 Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability in NETGEAR switching hubs (GS716Tv2 Firmware version 5.4.2.30 and earlier, and GS724Tv3 Firmware version 5.4.2.30 and earlier) allow remote attackers to hijack the authentication of administrators and alter the settings of the device via unspecified vectors. NETGEAR Switching hub provided by GS716Tv2 and GS724Tv3 Is a cross-site request forgery vulnerability (CWE-352) Exists. This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Reii Yano MrIf a user who is logged in to the management screen of the product accesses a specially crafted page, the settings of the product may be changed unintentionally