VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202012-1488 CVE-2020-5950 BIG-IP  Cross-site Scripting Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
On BIG-IP 14.1.0-14.1.2.6, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role. BIG-IP Contains a cross-site scripting vulnerability.Denial of service (DoS) It may be put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5
VAR-202012-0716 CVE-2020-27713 BIG-IP AFM  Vulnerabilities in lack of free memory after expiration CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
In certain configurations on version 13.1.3.4, when a BIG-IP AFM HTTP security profile is applied to a virtual server and the BIG-IP system receives a request with specific characteristics, the connection is reset and the Traffic Management Microkernel (TMM) leaks memory. BIG-IP AFM Is vulnerable to a lack of free memory after expiration.Denial of service (DoS) It may be put into a state. F5 BIG-IP AFM is an advanced firewall product used to protect against DDos attacks from F5 Corporation of the United States. There is a security vulnerability in BIG-IP AFM HTTP version 13.1.3.4
VAR-202012-1575 No CVE Ruijie Networks Co., Ltd. RG-NBR6000 series high-performance enterprise-level integrated gateway has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of network equipment product lines and solutions including switches, routers, software, security firewalls, wireless products, and storage. Ruijie Networks Co., Ltd. RG-NBR6000 series high-performance enterprise-level integrated gateway has an unauthorized access vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202012-1600 No CVE Rockwell Automation (China) Co., Ltd. 1769-L30ER has industrial control equipment vulnerabilities CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Rockwell Automation Co., Ltd. is one of the world's largest automation and information companies. Rockwell Automation (China) Co., Ltd. 1769-L30ER has an industrial control device vulnerability. Attackers can use the vulnerability to cause the I/O module to stop working and deny service.
VAR-202012-1601 No CVE Allen-Bradley CompactLogic 1769-L24ERQB1B has industrial control equipment vulnerabilities CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Rockwell Automation Co., Ltd. is one of the world's largest automation and information companies. Allen-Bradley CompactLogic 1769-L24ERQB1B has an industrial control device vulnerability. Attackers can use this vulnerability to cause the I/O module to stop working and deny service.
VAR-202012-1387 CVE-2020-7535 plural  Schneider Electric  Path traversal vulnerabilities in products CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal' Vulnerability Type) vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause disclosure of information when sending a specially crafted request to the controller over HTTP. plural Schneider Electric The product contains a path traversal vulnerability.Information may be obtained
VAR-202012-1384 CVE-2020-7549 plural  Schneider Electric  Product Exceptional Status Check Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause denial of HTTP and FTP services when a series of specially crafted requests is sent to the controller over HTTP. plural Schneider Electric The product contains a vulnerability related to checking for exceptional conditions.Denial of service (DoS) It may be put into a state. Schneider Electric Modicon M340 is a medium-range PLC (Programmable Logic Controller) of French Schneider Electric (Schneider Electric) for industrial processes and infrastructure. Schneider Electric Modicon M340 has a code issue vulnerability. Attackers can use the vulnerability to make HTTP and FTP services deny when a request for preparation is sent to the controller via HTTP
VAR-202012-0820 CVE-2020-28220 plural  Schneider Electric  Buffer error vulnerability in the product CVSS V2: 5.2
CVSS V3: 6.8
Severity: MEDIUM
A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Modicon M258 Firmware (All versions prior to V5.0.4.11) and SoMachine/SoMachine Motion software (All versions), that could cause a buffer overflow when the length of a file transferred to the webserver is not verified. Modicon M258 firmware, SoMachine , SoMachine Motion The software contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Schneider Electric Modicon M258 is a programmable automation controller produced by Schneider Electric in France
VAR-202012-1391 CVE-2020-7540 plural  Schneider Electric  Vulnerability in lack of authentication for critical features in the product CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A CWE-306: Missing Authentication for Critical Function vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause unauthenticated command execution in the controller when sending special HTTP requests. plural Schneider Electric The product is vulnerable to a lack of authentication for critical features.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202012-0950 CVE-2020-29563 Western Digital My Cloud OS 5  Authentication vulnerability in device CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on Western Digital My Cloud OS 5 devices before 5.07.118. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to gain access to the device. This vulnerability allows remote attackers to bypass authentication on affected installations of Western Digital MyCloud PR4100. Authentication is not required to exploit this vulnerability.The specific flaw exists within the mod_rewrite module. The issue results from the way the software parses URLs to make authorization decisions. An attacker can leverage this vulnerability to bypass authentication on the system
VAR-202012-1420 CVE-2020-7793 ua-parser-js  Resource exhaustion vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info). ua-parser-js Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202012-0819 CVE-2020-28219 EcoStruxure Geo SCADA Expert 2019  and  2020  Vulnerability regarding inadequate protection of credentials in CVSS V2: 2.1
CVSS V3: 7.8
Severity: HIGH
A CWE-522: Insufficiently Protected Credentials vulnerability exists in EcoStruxure Geo SCADA Expert 2019 (Original release and Monthly Updates to September 2020, from 81.7268.1 to 81.7578.1) and EcoStruxure Geo SCADA Expert 2020 (Original release and Monthly Updates to September 2020, from 83.7551.1 to 83.7578.1), that could cause exposure of credentials to server-side users when web users are logged in to Virtual ViewX. EcoStruxure Geo SCADA Expert 2019 and 2020 Exists in an inadequate protection of credentials.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202012-0618 CVE-2020-27127 plural  Cisco Jabber  Product   Vulnerability in privilege management CVSS V2: 9.0
CVSS V3: 9.9
Severity: CRITICAL
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Jabber is a set of unified communication client solutions of Cisco (Cisco). The program provides online status display, instant messaging, voice and other functions
VAR-202012-0619 CVE-2020-27132 plural  Cisco Jabber  Product permission management vulnerabilities CVSS V2: 9.0
CVSS V3: 9.9
Severity: CRITICAL
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory. Microsoft Windows is a desktop operating system of Microsoft Corporation. Cisco Jabber has an input validation error vulnerability, which is caused by the software's incorrect validation of email content. An attacker could exploit this vulnerability by sending a specially crafted message to the targeted system. A successful exploit could allow an attacker to cause the application to return sensitive authentication information to another system, possibly for further attacks
VAR-202012-0621 CVE-2020-27134 plural  Cisco Jabber  Product permission management vulnerabilities CVSS V2: 9.0
CVSS V3: 9.9
Severity: CRITICAL
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Jabber is a set of unified communication client solutions of Cisco (Cisco). The program provides online status display, instant messaging, voice and other functions. An input validation error vulnerability exists in Cisco Jabber due to improper validation of email content. An attacker can exploit the security vulnerability by sending a specially crafted XMPP message to the affected software. By interacting with the target user's message, the attacker can inject arbitrary script code in the Jabber message window interface
VAR-202012-0098 CVE-2020-12594 SMG  Vulnerability in CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
A privilege escalation flaw allows a malicious, authenticated, privileged CLI user to escalate their privileges on the system and gain full control over the SMG appliance. This affects SMG prior to 10.7.4. SMG Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Symantec Messaging Gateway is a set of spam filters of Symantec Corporation of the United States. The product includes features such as antispam, antivirus, advanced content filtering, and data loss prevention. Symantec Messaging Gateway before version 10.7.4 has an authorization problem vulnerability. This vulnerability is caused by improper privilege control required for system upgrades. Attackers can complete the control of the device by upgrading the privileges of the SMG device
VAR-202012-0099 CVE-2020-12595 SMG  Vulnerability in CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
An information disclosure flaw allows a malicious, authenticated, privileged web UI user to obtain a password for a remote SCP backup server that they might not otherwise be authorized to access. This affects SMG prior to 10.7.4. SMG Contains an unspecified vulnerability.Information may be obtained. Symantec Messaging Gateway is a set of spam filters of Symantec Corporation of the United States. The product includes features such as antispam, antivirus, advanced content filtering, and data loss prevention. Symantec Messaging Gateway before version 10.7.4 has a security vulnerability, which can be exploited by attackers to obtain sensitive information
VAR-202012-1626 No CVE Beijing Wanwei Yingchuang Technology Development Co., Ltd. pollution source online monitoring system has a storage type cross-site scripting vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Beijing Wanwei Yingchuang Technology Development Co., Ltd. is committed to the R&D and application of products and technologies in the field of environmental protection Internet of Things. It is an enterprise integrating R&D, production and sales. Beijing Wanwei Yingchuang Technology Development Co., Ltd. pollution source online monitoring system has a storage-type cross-site scripting vulnerability. Attackers can use vulnerabilities to obtain sensitive information such as user cookies.
VAR-202012-1602 No CVE Omron Automation (China) Co., Ltd. CJ2M-CPU11 has industrial control equipment vulnerabilities CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Omron Group is a manufacturer of automation control and electronic equipment. Omron Automation (China) Co., Ltd. CJ2M-CPU11 has industrial control equipment vulnerabilities. Attackers can use vulnerabilities to stop control functions and cause production interruptions.
VAR-202012-1624 No CVE Unauthorized access vulnerability exists in the enterprise-level intelligent online behavior management system of Feiyuxing CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Chengdu Feiyuxing Technology Co., Ltd. is a company dedicated to providing intelligent and easy-to-use network communication products and services, continuously improving the quality of network use through innovative technologies, and cooperating with users to create an intelligent and humanized network management platform. An unauthorized access vulnerability exists in the enterprise-level intelligent online behavior management system of Feiyuxing. Attackers can use vulnerabilities to obtain sensitive information and perform unauthorized operations.