VARIoT IoT vulnerabilities database
| VAR-202011-1278 | CVE-2020-7567 | Modicon M221 Vulnerability regarding lack of encryption of critical data in |
CVSS V2: 2.9 CVSS V3: 5.7 Severity: Medium |
A CWE-311: Missing Encryption of Sensitive Data vulnerability exists in Modicon M221 (all references, all versions) that could allow the attacker to find the password hash when the attacker has captured the traffic between EcoStruxure Machine - Basic software and Modicon M221 controller and broke the encryption keys. Modicon M221 There is a vulnerability in the lack of encryption of critical data.Information may be obtained
| VAR-202011-1296 | CVE-2020-7561 | Easergy T300 Access control vulnerabilities in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A CWE-306: Missing Authentication for Critical Function vulnerability exists in Easergy T300 (with firmware 2.7 and older) that could cause a wide range of problems, including information exposure, denial of service, and command execution when access to a resource from an attacker is not restricted or incorrectly restricted. Easergy T300 There is an access control vulnerability in.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Easergy T300 is a new generation of distribution network automation intelligent terminal, adhering to the "modularity, flexibility, application-oriented" design concept, can be widely used in medium voltage distribution network management, fault location, isolation and recovery (FLISR), distributed energy integration Internet, energy growth and asset management.
Easergy T300 2.7 and earlier versions have improper access control vulnerabilities
| VAR-202011-1261 | CVE-2020-5668 | Made by Mitsubishi Electric MELSEC iQ-R Resource exhaustion vulnerabilities in the series |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version '19' and earlier, R04/08/16/32/120 (EN) CPU firmware version '51' and earlier, R08/16/32/120SFCPU firmware version '22' and earlier, R08/16/32/120PCPU firmware version '25' and earlier, R08/16/32/120PSFCPU firmware version '06' and earlier, RJ71EN71 firmware version '47' and earlier, RJ71GF11-T2 firmware version '47' and earlier, RJ72GF15-T2 firmware version '07' and earlier, RJ71GP21-SX firmware version '47' and earlier, RJ71GP21S-SX firmware version '47' and earlier, and RJ71GN11-T2 firmware version '11' and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet. Provided by Mitsubishi Electric Corporation MELSEC iQ-R Resource exhaustion vulnerabilities in series units (CWE-400) Exists This vulnerability information is provided by the developer for the purpose of making it known to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developers.Crafted by a remote third party SLMP Receiving packets can have the following effects: * CPU In the case of a unit, an error occurs and program execution and communication interfere with service operation. (DoS) Become in a state * CPU In the case of other than the unit, communication via the unit interferes with service operation. (DoS) In addition, a reset is required for recovery
| VAR-202011-1276 | CVE-2020-7565 | Modicon M221 Vulnerability in cryptography |
CVSS V2: 4.3 CVSS V3: 7.3 Severity: HIGH |
A CWE-326: Inadequate Encryption Strength vulnerability exists in Modicon M221 (all references, all versions) that could allow the attacker to break the encryption key when the attacker has captured the traffic between EcoStruxure Machine - Basic software and Modicon M221 controller. Modicon M221 Contains a cryptographic vulnerability.Information may be obtained and information may be tampered with. Modicon TM221 is a programmable controller of Schneider Electric (China) Co., Ltd., used for single device control architecture.
Schneider Electric (China) Co., Ltd. Modicon TM221 has an information leakage vulnerability, which can be exploited by attackers to obtain sensitive information
| VAR-202011-1277 | CVE-2020-7566 | Modicon M221 Insufficient random value vulnerability in |
CVSS V2: 4.3 CVSS V3: 7.3 Severity: High |
A CWE-334: Small Space of Random Values vulnerability exists in Modicon M221 (all references, all versions) that could allow the attacker to break the encryption keys when the attacker has captured the traffic between EcoStruxure Machine - Basic software and Modicon M221 controller. Modicon M221 Is vulnerable to inadequate random values.Information may be obtained and information may be tampered with
| VAR-202011-1012 | CVE-2020-3419 | Cisco Webex Meetings and Cisco Webex Meetings Server Vulnerability in improper control of dynamically manipulated code resources in |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to join a Webex session without appearing on the participant list. This vulnerability is due to improper handling of authentication tokens by a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. A successful exploit requires the attacker to have access to join a Webex meeting, including applicable meeting join links and passwords. The attacker could then exploit this vulnerability to join meetings, without appearing in the participant list, while having full access to audio, video, chat, and screen sharing capabilities. Cisco Webex Meetings is a set of video conferencing solutions of Cisco (Cisco)
| VAR-202011-1020 | CVE-2020-3482 | Cisco Expressway Software permission management vulnerabilities |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the Traversal Using Relays around NAT (TURN) server component of Cisco Expressway software could allow an unauthenticated, remote attacker to bypass security controls and send network traffic to restricted destinations. The vulnerability is due to improper validation of specific connection information by the TURN server within the affected software. An attacker could exploit this issue by sending specially crafted network traffic to the affected software. A successful exploit could allow the attacker to send traffic through the affected software to destinations beyond the application, possibly allowing the attacker to gain unauthorized network access. Cisco Expressway The software contains a vulnerability in privilege management.Information may be obtained and information may be tampered with. The software provides simple, highly secure access for users outside the firewall, helping remote workers work more efficiently on the device of their choice
| VAR-202011-0715 | CVE-2020-26081 | Cisco IoT Field Network Director Injection vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Multiple vulnerabilities in the web UI of Cisco IoT Field Network Director (FND) could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against users on an affected system. The vulnerabilities are due to insufficient validation of user-supplied input that is processed by the web UI. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information on an affected system. The system has functions such as equipment management, asset tracking and smart metering
| VAR-202011-0706 | CVE-2020-26076 | Cisco IoT Field Network Director Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in Cisco IoT Field Network Director (FND) could allow an unauthenticated, remote attacker to view sensitive database information on an affected device. The vulnerability is due to the absence of authentication for sensitive information. An attacker could exploit this vulnerability by sending crafted curl commands to an affected device. A successful exploit could allow the attacker to view sensitive database information on the affected device. The system has functions such as equipment management, asset tracking and smart metering. The vulnerability is due to
| VAR-202011-0704 | CVE-2020-26072 | Cisco IoT Field Network Director Vulnerability in privilege management |
CVSS V2: 5.5 CVSS V3: 8.7 Severity: HIGH |
A vulnerability in the SOAP API of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to access and modify information on devices that belong to a different domain. The vulnerability is due to insufficient authorization in the SOAP API. An attacker could exploit this vulnerability by sending SOAP API requests to affected devices for devices that are outside their authorized domain. A successful exploit could allow the attacker to access and modify information on devices that belong to a different domain. The system has functions such as equipment management, asset tracking and smart metering
| VAR-202011-0709 | CVE-2020-26079 | Cisco IoT Field Network Director Vulnerability regarding inadequate protection of credentials in |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
A vulnerability in the web UI of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to obtain hashes of user passwords on an affected device. The vulnerability is due to insufficient protection of user credentials. An attacker could exploit this vulnerability by logging in as an administrative user and crafting a call for user information. A successful exploit could allow the attacker to obtain hashes of user passwords on an affected device. The system has functions such as equipment management, asset tracking and smart metering
| VAR-202011-0707 | CVE-2020-26077 | Cisco IoT Field Network Director access control error vulnerability |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
A vulnerability in the access control functionality of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to view lists of users from different domains that are configured on an affected system. The vulnerability is due to improper access control. An attacker could exploit this vulnerability by sending an API request that alters the domain for a requested user list on an affected system. A successful exploit could allow the attacker to view lists of users from different domains on the affected system. Cisco IoT Field Network Director (FND) Contains a privilege management vulnerability.Information may be obtained. The system has functions such as equipment management, asset tracking and smart metering
| VAR-202011-0714 | CVE-2020-26080 | Cisco IoT Field Network Director Vulnerability in privilege management |
CVSS V2: 4.0 CVSS V3: 4.1 Severity: MEDIUM |
A vulnerability in the user management functionality of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to manage user information for users in different domains on an affected system. The vulnerability is due to improper domain access control. An attacker could exploit this vulnerability by manipulating JSON payloads to target different domains on an affected system. A successful exploit could allow the attacker to manage user information for users in different domains on an affected system. The system has functions such as equipment management, asset tracking and smart metering. The vulnerability is due to
| VAR-202011-0708 | CVE-2020-26078 | Cisco IoT Field Network Director Traversal Vulnerability in Japan |
CVSS V2: 5.5 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the file system of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to overwrite files on an affected system. The vulnerability is due to insufficient file system protections. An attacker could exploit this vulnerability by crafting API requests and sending them to an affected system. A successful exploit could allow the attacker to overwrite files on an affected system. The system has functions such as equipment management, asset tracking and smart metering
| VAR-202011-0705 | CVE-2020-26075 | Cisco IoT Field Network Director SQL injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the REST API of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to gain access to the back-end database of an affected device. The vulnerability is due to insufficient input validation of REST API requests that are made to an affected device. An attacker could exploit this vulnerability by crafting malicious API requests to the affected device. A successful exploit could allow the attacker to gain access to the back-end database of the affected device. Cisco IoT Field Network Director (IoT-FND) is an end-to-end Internet of Things management system from Cisco in the United States. The system has functions such as equipment management, asset tracking and smart metering
| VAR-202011-1273 | CVE-2020-7562 | plural Modicon Out-of-bounds read vulnerabilities in the product |
CVSS V2: 5.8 CVSS V3: 8.1 Severity: High |
A CWE-125: Out-of-Bounds Read vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause a segmentation fault or a buffer overflow when uploading a specially crafted file on the controller over FTP. plural Modicon The product contains an out-of-bounds read vulnerability.Information is obtained and denial of service (DoS) It may be put into a state
| VAR-202011-0609 | CVE-2020-24297 | TP-Link TL-WPA4220 In the device OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
httpd on TP-Link TL-WPA4220 devices (versions 2 through 4) allows remote authenticated users to execute arbitrary OS commands by sending crafted POST requests to the endpoint /admin/powerline. Fixed version: TL-WPA4220(EU)_V4_201023. TP-Link TL-WPA4220 The device has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. TP-Link TL-WPA4220 is a 300Mbps AV600 Wi-Fi powerline extender.
The httpd in TP-Link TL-WPA4220 has an arbitrary OS command execution vulnerability
| VAR-202011-1016 | CVE-2020-3531 | Cisco IoT Field Network Director Vulnerability regarding lack of authentication for critical features in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability in the REST API of Cisco IoT Field Network Director (FND) could allow an unauthenticated, remote attacker to access the back-end database of an affected system. The vulnerability exists because the affected software does not properly authenticate REST API calls. An attacker could exploit this vulnerability by obtaining a cross-site request forgery (CSRF) token and then using the token with REST API requests. A successful exploit could allow the attacker to access the back-end database of the affected device and read, alter, or drop information. Cisco IoT Field Network Director (IoT-FND) is an end-to-end Internet of Things management system from Cisco in the United States. The system has functions such as equipment management, asset tracking and smart metering
| VAR-202011-1275 | CVE-2020-7564 | plural Modicon Classic buffer overflow vulnerability in the product |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: High |
A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause write access and the execution of commands when uploading a specially crafted file on the controller over FTP. plural Modicon The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202011-0839 | CVE-2020-28005 | TP-Link TL-WPA4220 Classic buffer overflow vulnerability in device |
CVSS V2: 3.5 CVSS V3: 6.5 Severity: MEDIUM |
httpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin/syslog endpoint. Fixed version: TL-WPA4220(EU)_V4_201023. TP-Link TL-WPA4220 A classic buffer overflow vulnerability exists in the device.Denial of service (DoS) It may be put into a state. TP-Link TL-WPA4220 is a 300Mbps AV600 Wi-Fi powerline extender