VARIoT IoT vulnerabilities database
| VAR-202012-1384 | CVE-2020-7549 | plural Schneider Electric Product Exceptional Status Check Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause denial of HTTP and FTP services when a series of specially crafted requests is sent to the controller over HTTP. plural Schneider Electric The product contains a vulnerability related to checking for exceptional conditions.Denial of service (DoS) It may be put into a state. Schneider Electric Modicon M340 is a medium-range PLC (Programmable Logic Controller) of French Schneider Electric (Schneider Electric) for industrial processes and infrastructure.
Schneider Electric Modicon M340 has a code issue vulnerability. Attackers can use the vulnerability to make HTTP and FTP services deny when a request for preparation is sent to the controller via HTTP
| VAR-202012-0820 | CVE-2020-28220 | plural Schneider Electric Buffer error vulnerability in the product |
CVSS V2: 5.2 CVSS V3: 6.8 Severity: MEDIUM |
A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Modicon M258 Firmware (All versions prior to V5.0.4.11) and SoMachine/SoMachine Motion software (All versions), that could cause a buffer overflow when the length of a file transferred to the webserver is not verified. Modicon M258 firmware, SoMachine , SoMachine Motion The software contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Schneider Electric Modicon M258 is a programmable automation controller produced by Schneider Electric in France
| VAR-202012-1391 | CVE-2020-7540 | plural Schneider Electric Vulnerability in lack of authentication for critical features in the product |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A CWE-306: Missing Authentication for Critical Function vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause unauthenticated command execution in the controller when sending special HTTP requests. plural Schneider Electric The product is vulnerable to a lack of authentication for critical features.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202012-0950 | CVE-2020-29563 | Western Digital My Cloud OS 5 Authentication vulnerability in device |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered on Western Digital My Cloud OS 5 devices before 5.07.118. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to gain access to the device. This vulnerability allows remote attackers to bypass authentication on affected installations of Western Digital MyCloud PR4100. Authentication is not required to exploit this vulnerability.The specific flaw exists within the mod_rewrite module. The issue results from the way the software parses URLs to make authorization decisions. An attacker can leverage this vulnerability to bypass authentication on the system
| VAR-202012-1420 | CVE-2020-7793 | ua-parser-js Resource exhaustion vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info). ua-parser-js Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202012-0819 | CVE-2020-28219 | EcoStruxure Geo SCADA Expert 2019 and 2020 Vulnerability regarding inadequate protection of credentials in |
CVSS V2: 2.1 CVSS V3: 7.8 Severity: HIGH |
A CWE-522: Insufficiently Protected Credentials vulnerability exists in EcoStruxure Geo SCADA Expert 2019 (Original release and Monthly Updates to September 2020, from 81.7268.1 to 81.7578.1) and EcoStruxure Geo SCADA Expert 2020 (Original release and Monthly Updates to September 2020, from 83.7551.1 to 83.7578.1), that could cause exposure of credentials to server-side users when web users are logged in to Virtual ViewX. EcoStruxure Geo SCADA Expert 2019 and 2020 Exists in an inadequate protection of credentials.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202012-0618 | CVE-2020-27127 | plural Cisco Jabber Product Vulnerability in privilege management |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Jabber is a set of unified communication client solutions of Cisco (Cisco). The program provides online status display, instant messaging, voice and other functions
| VAR-202012-0619 | CVE-2020-27132 | plural Cisco Jabber Product permission management vulnerabilities |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory. Microsoft Windows is a desktop operating system of Microsoft Corporation. Cisco Jabber has an input validation error vulnerability, which is caused by the software's incorrect validation of email content. An attacker could exploit this vulnerability by sending a specially crafted message to the targeted system. A successful exploit could allow an attacker to cause the application to return sensitive authentication information to another system, possibly for further attacks
| VAR-202012-0621 | CVE-2020-27134 | plural Cisco Jabber Product permission management vulnerabilities |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Jabber is a set of unified communication client solutions of Cisco (Cisco). The program provides online status display, instant messaging, voice and other functions. An input validation error vulnerability exists in Cisco Jabber due to improper validation of email content. An attacker can exploit the security vulnerability by sending a specially crafted XMPP message to the affected software. By interacting with the target user's message, the attacker can inject arbitrary script code in the Jabber message window interface
| VAR-202012-0098 | CVE-2020-12594 | SMG Vulnerability in |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
A privilege escalation flaw allows a malicious, authenticated, privileged CLI user to escalate their privileges on the system and gain full control over the SMG appliance. This affects SMG prior to 10.7.4. SMG Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Symantec Messaging Gateway is a set of spam filters of Symantec Corporation of the United States. The product includes features such as antispam, antivirus, advanced content filtering, and data loss prevention. Symantec Messaging Gateway before version 10.7.4 has an authorization problem vulnerability. This vulnerability is caused by improper privilege control required for system upgrades. Attackers can complete the control of the device by upgrading the privileges of the SMG device
| VAR-202012-0099 | CVE-2020-12595 | SMG Vulnerability in |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
An information disclosure flaw allows a malicious, authenticated, privileged web UI user to obtain a password for a remote SCP backup server that they might not otherwise be authorized to access. This affects SMG prior to 10.7.4. SMG Contains an unspecified vulnerability.Information may be obtained. Symantec Messaging Gateway is a set of spam filters of Symantec Corporation of the United States. The product includes features such as antispam, antivirus, advanced content filtering, and data loss prevention. Symantec Messaging Gateway before version 10.7.4 has a security vulnerability, which can be exploited by attackers to obtain sensitive information
| VAR-202012-1626 | No CVE | Beijing Wanwei Yingchuang Technology Development Co., Ltd. pollution source online monitoring system has a storage type cross-site scripting vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Beijing Wanwei Yingchuang Technology Development Co., Ltd. is committed to the R&D and application of products and technologies in the field of environmental protection Internet of Things. It is an enterprise integrating R&D, production and sales.
Beijing Wanwei Yingchuang Technology Development Co., Ltd. pollution source online monitoring system has a storage-type cross-site scripting vulnerability. Attackers can use vulnerabilities to obtain sensitive information such as user cookies.
| VAR-202012-1602 | No CVE | Omron Automation (China) Co., Ltd. CJ2M-CPU11 has industrial control equipment vulnerabilities |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Omron Group is a manufacturer of automation control and electronic equipment.
Omron Automation (China) Co., Ltd. CJ2M-CPU11 has industrial control equipment vulnerabilities. Attackers can use vulnerabilities to stop control functions and cause production interruptions.
| VAR-202012-1624 | No CVE | Unauthorized access vulnerability exists in the enterprise-level intelligent online behavior management system of Feiyuxing |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Chengdu Feiyuxing Technology Co., Ltd. is a company dedicated to providing intelligent and easy-to-use network communication products and services, continuously improving the quality of network use through innovative technologies, and cooperating with users to create an intelligent and humanized network management platform.
An unauthorized access vulnerability exists in the enterprise-level intelligent online behavior management system of Feiyuxing. Attackers can use vulnerabilities to obtain sensitive information and perform unauthorized operations.
| VAR-202012-1362 | CVE-2020-5665 | Made by Mitsubishi Electric MELSEC iQ-F Service operation interruption in the series (DoS) Vulnerability |
CVSS V2: 3.3 CVSS V3: 7.4 Severity: HIGH |
Improper check or handling of exceptional conditions in MELSEC iQ-F series FX5U(C) CPU unit firmware version 1.060 and earlier allows an attacker to cause a denial-of-service (DoS) condition on program execution and communication by sending a specially crafted ARP packet. This vulnerability information is provided by the developer for the purpose of disseminating it to product users. For recovery CPU The unit needs to be reset
| VAR-202012-1379 | CVE-2020-7543 | plural Schneider Electric Product Exceptional Status Check Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: High |
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see security notifications for affected versions), that could cause denial of service when a specially crafted Read Physical Memory request over Modbus is sent to the controller. plural Schneider Electric The product contains a vulnerability related to checking for exceptional conditions.Denial of service (DoS) It may be put into a state
| VAR-202012-1385 | CVE-2020-7560 | Schneider Electric EcoStruxure Control Expert input validation error vulnerability |
CVSS V2: 6.8 CVSS V3: 8.6 Severity: HIGH |
A CWE-123: Write-what-where Condition vulnerability exists in EcoStruxure™ Control Expert (all versions) and Unity Pro (former name of EcoStruxure™ Control Expert) (all versions), that could cause a crash of the software or unexpected code execution when opening a malicious file in EcoStruxure™ Control Expert software. Schneider Electric EcoStruxure Control Expert (formerly known as Unity Pro) is a set of programming software for Schneider Electric logic controller products from French Schneider Electric (Schneider Electric).
There is a security vulnerability in Schneider Electric EcoStruxure Control Expert. The vulnerability stems from the failure to perform security checks on open files
| VAR-202101-0325 | CVE-2020-26085 | plural Cisco Jabber In the product OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Jabber is a set of unified communication client solutions of Cisco (Cisco). The program provides online status display, instant messaging, voice and other functions
| VAR-202012-0620 | CVE-2020-27133 | plural Cisco Jabber Product permission management vulnerabilities |
CVSS V2: 9.0 CVSS V3: 9.9 Severity: CRITICAL |
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Jabber is a set of unified communication client solutions of Cisco (Cisco). The program provides online status display, instant messaging, voice and other functions. An authorization issue vulnerability exists in Cisco Jabber. The vulnerability is caused by the software allowing unauthenticated users to execute commands and improper handling of input to the application protocol handler. Execute arbitrary commands on the target system without the privileges of the client software's user account
| VAR-202012-1481 | CVE-2020-4633 | IBM Resilient SOAR In CSV Vulnerability in neutralizing mathematical elements in files |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: High |
IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation. IBM Resilient SOAR Has CSV There is a vulnerability related to neutralization of mathematical elements in the file and a vulnerability related to input verification.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state