VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202010-0306 CVE-2020-14788 Oracle Communications of Oracle Communications Diameter Signaling Router In User Interface Vulnerability CVSS V2: 5.8
CVSS V3: 6.1
Severity: MEDIUM
Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) product of Oracle Communications (component: User Interface). Supported versions that are affected are 8.0.0.0-8.4.0.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Diameter Signaling Router (DSR), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Diameter Signaling Router (DSR) accessible data as well as unauthorized read access to a subset of Oracle Communications Diameter Signaling Router (DSR) accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
VAR-202010-1654 No CVE SQL injection vulnerability exists in BEESCMS or***_sa***.php file CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
BEESCMS uses PHP+MYSQL, has a multi-language system, and easy expansion of content modules. The BEESCMS or***_sa***.php file has a SQL injection vulnerability. Attackers can use vulnerabilities to obtain sensitive information in the database.
VAR-202010-1617 No CVE Sangfor SSL VPN has command execution vulnerabilities CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Sangfor Technology Co., Ltd. is a provider of products, services and solutions focusing on enterprise-level security, cloud computing and infrastructure. Sangfor SSL VPN has command execution vulnerabilities. Attackers can use the vulnerability to execute arbitrary commands on the server.
VAR-202010-1638 No CVE Advantech WebAccess Node has a denial of service vulnerability (CNVD-2020-57243) CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
WebAccess Node is an HMI/SCADA monitoring software completely based on IE browser from Advantech (China) Co., Ltd. Advantech WebAccess Node has a denial of service vulnerability. An attacker can use this vulnerability to cause a denial of service.
VAR-202010-1639 No CVE Advantech WebAccess/SCADA has a denial of service vulnerability (CNVD-2020-57242) CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. Advantech WebAccess/SCADA has a denial of service vulnerability. An attacker can use this vulnerability to cause a denial of service.
VAR-202010-1640 No CVE Shanghai ZLAN Information Technology Co., Ltd. ZLAN7144N2 has an arbitrary password reset vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shanghai ZLAN Information Technology Co., Ltd. is a high-tech enterprise that provides industrial IoT solutions. It was established in 2008. Its products include serial server, IoT chips, serial to Ethernet, etc. Shanghai ZLAN Information Technology Co., Ltd. ZLAN7144N2 has an arbitrary password reset vulnerability. An attacker can use the vulnerability to send a specific message to the port through the network to reset the device's password.
VAR-202010-1438 CVE-2020-4564 IBM Sterling B2B Integrator Standard Edition  and  Sterling File Gateway  Cross-site Scripting Vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 and IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 183933. Vendor is responsible for this vulnerability IBM X-Force ID: 183933 Is published as.Information may be obtained and information may be tampered with. The software supports secure integration of complex B2B processes with diverse partner communities
VAR-202010-0514 CVE-2020-26887 FRITZ!OS  Vulnerability in CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
FRITZ!OS before 7.21 on FRITZ!Box devices allows a bypass of a DNS Rebinding protection mechanism. FRITZ!OS Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. AVM Fritz! Box is a wireless router made by AVM in Germany. No detailed vulnerability details are currently provided
VAR-202010-1354 CVE-2020-4756 IBM Spectrum Scale  and  Elastic Storage System  Improper Resource Shutdown and Release Vulnerability in CVSS V2: 4.9
CVSS V3: 5.5
Severity: MEDIUM
IBM Spectrum Scale V4.2.0.0 through V4.2.3.23 and V5.0.0.0 through V5.0.5.2 as well as IBM Elastic Storage System 6.0.0 through 6.0.1.0 could allow a local attacker to invoke a subset of ioctls on the device with invalid arguments that could crash the keneral and cause a denial of service. IBM X-Force ID: 188599. Vendor exploits this vulnerability IBM X-Force ID: 188599 Is published as.Denial of service (DoS) It may be put into a state. The IBM Elastic Storage System is a device from IBM of the United States for data management of large data volumes
VAR-202010-0833 CVE-2020-24375 Freebox Server  Spoofing Authentication Vulnerability in CVSS V2: 4.3
CVSS V3: 6.5
Severity: MEDIUM
A DNS rebinding vulnerability in the UPnP MediaServer implementation in Freebox Server before 4.2.3. Freebox Server Contains a spoofing authentication evasion vulnerability.Information may be obtained. The Freebox server is a DSL modem, router, Wi-Fi hotspot, NAS (250 GB hard disk), DECT base with up to 8 connected DECT phones, and digital video recorder-T for TNT (also known as DVB) And IPTV. Versions of Freebox Server prior to 4.2.3 have security vulnerabilities. The vulnerabilities stem from the existence of DNS rebinding vulnerabilities in the implementation of UPnP MediaServer, allowing attackers to gain access to the local area network by manipulating the DNS (Domain Name Service) working mechanism
VAR-202010-1498 CVE-2020-9990 Apple macOS process_token_SetFence Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability CVSS V2: 6.9
CVSS V3: 7.8
Severity: HIGH
A race condition was addressed with additional validation. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with kernel privileges. This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the AppleIntelKBLGraphics kernel extension. The issue results from the lack of proper locking when performing operations on an object. Apple OS X is a set of dedicated operating systems developed by Apple for Mac computers. Apple macOS could allow a local authenticated malicious user to gain elevated privileges on the system, caused by a time-of-check time-of-use race condition in the AppleIntelKBLGraphics kernel extension
VAR-202010-1630 No CVE Suzhou Inovance Technology Co., Ltd. AM600 Modbus has a buffer overflow vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
AM600 is a medium-sized programmable logic controller (PLC) designed with a modular structure. Suzhou Inovance Technology Co., Ltd. AM600 has a buffer overflow vulnerability. The attacker sent malformed Modbus data packets, causing abnormalities inside the PLC and crashing the program.
VAR-202010-1641 No CVE Shanghai ZLAN Information Technology Co., Ltd. ZLAN7144N2 has an information disclosure vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Shanghai ZLAN Information Technology Co., Ltd. is a high-tech enterprise that provides industrial IoT solutions. It was established in 2008. Its products include serial server, IoT chips, serial to Ethernet, etc. Shanghai ZLAN Information Technology Co., Ltd. ZLAN7144N2 has an information disclosure vulnerability. An attacker can use the vulnerability to send a specific message to the UDP port through the network to obtain the WiFi hotspot connection password of the device.
VAR-202010-1631 No CVE Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air-conditioning network monitoring alarm terminal has unauthorized access vulnerabilities CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
The precision air conditioner network monitoring terminal is an intelligent network monitoring device based on precision air conditioners, which is connected to the network through a network cable, and continuously collects air conditioner operating status data. Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air-conditioning network monitoring and alarm terminal has an unauthorized access vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202010-1632 No CVE Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air-conditioning network monitoring alarm terminal has file upload vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
The precision air conditioner network monitoring terminal is an intelligent network monitoring device based on precision air conditioners, which is connected to the network through a network cable, and continuously collects air conditioner operating status data. Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air-conditioning network monitoring and alarm terminal has a file upload vulnerability. Attackers can use this vulnerability to gain server control rights.
VAR-202010-1633 No CVE Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air conditioner network monitoring and alarm terminal has file upload vulnerability (CNVD-2020-57687) CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
The precision air conditioner network monitoring terminal is an intelligent network monitoring device based on precision air conditioners, which is connected to the network through a network cable, and continuously collects air conditioner operating status data. Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air-conditioning network monitoring and alarm terminal has a file upload vulnerability. Attackers can use this vulnerability to gain server control rights.
VAR-202010-1634 No CVE Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air conditioner network monitoring and alarm terminal has file upload vulnerability (CNVD-2020-57686) CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
The precision air conditioner network monitoring terminal is an intelligent network monitoring device based on precision air conditioners, which is connected to the network through a network cable, and continuously collects air conditioner operating status data. Guangzhou Junda Intelligent Software Technology Co., Ltd. intelligent precision air-conditioning network monitoring and alarm terminal has a file upload vulnerability. Attackers can use this vulnerability to gain server control rights.
VAR-202010-1627 No CVE H3C Magic R2+ProG router has unauthorized access vulnerability CVSS V2: 3.6
CVSS V3: -
Severity: LOW
H3C Magic R2+ is a wireless dual-band router specially designed by New H3C Technology Co., Ltd. H3C Magic R2+ProG router has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202010-0890 CVE-2020-26183 Dell EMC NetWorker  Vulnerability in externally accessible files or directories in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Dell EMC NetWorker versions prior to 19.3.0.2 contain an improper authorization vulnerability. Certain remote users with low privileges may exploit this vulnerability to perform 'nsrmmdbd' operations in an unintended manner. The software provides backup and recovery, deduplication, backup reporting, and more
VAR-202010-0889 CVE-2020-26182 Dell EMC NetWorker  Vulnerability in externally accessible files or directories in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Dell EMC NetWorker versions prior to 19.3.0.2 contain an incorrect privilege assignment vulnerability. A non-LDAP remote user with low privileges may exploit this vulnerability to perform 'saveset' related operations in an unintended manner. The vulnerability is not exploitable by users authenticated via LDAP. The software provides backup and recovery, deduplication, backup reporting, and more