VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202008-0639 CVE-2020-15531 Silicon Labs Bluetooth Low Energy SDK Classic buffer overflow vulnerability in CVSS V2: 5.8
CVSS V3: 8.8
Severity: HIGH
Silicon Labs Bluetooth Low Energy SDK before 2.13.3 has a buffer overflow via packet data. This is an over-the-air remote code execution vulnerability in Bluetooth LE in EFR32 SoCs and associated modules running Bluetooth SDK, supporting Central or Observer roles. (DoS) It may be put into a state
VAR-202008-1289 No CVE Tenda AC6 Router setting interface has logic flaws CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
AC6 is a 11AC dual-band wireless router dedicated to 1200M optical fiber. Tenda AC6 Router setting interface has a logic flaw vulnerability, attackers can use the vulnerability to obtain sensitive information.
VAR-202008-0199 CVE-2019-6258 D-Link DIR-822 Classic buffer overflow vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-822 Rev.Bx devices with firmware v.202KRb06 and older allow a buffer overflow via long MacAddress data in a /HNAP1/SetClientInfo HNAP protocol message, which is mishandled in /usr/sbin/udhcpd during reading of the /var/servd/LAN-1-udhcpd.conf file. D-Link DIR-822 Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. D-Link DIR-822 is an AC1200 Wi-Fi router. D-Link DIR-822 v.202KRb06 and earlier versions have a buffer overflow vulnerability
VAR-202008-0623 CVE-2020-14934 Contiki-NG Out-of-bounds write vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP agent. The function parsing the received SNMP request does not verify the input message's requested variables against the capacity of the internal SNMP engine buffer. If the number of variables in the request exceeds the allocated buffer, a memory write out of the buffer boundaries occurs. This write operation provides a possibility to overwrite other variables allocated in the .bss section by the application. Because the sender of the frame is in control of the content that will be written beyond the buffer limits, and there is no strict process memory separation, this issue may allow overwriting of sensitive memory areas of an IoT device. Contiki-NG Is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Contiki-NG is an open source cross-platform operating system for next-generation IoT (Internet of Things) devices. The vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in incorrect read and write operations to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow
VAR-202008-0624 CVE-2020-14935 Contiki-NG Out-of-bounds write vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP bulk get request response encoding function. The function parsing the received SNMP request does not verify the input message's requested variables against the capacity of the internal SNMP engine buffer. When a bulk get request response is assembled, a stack buffer dedicated for OIDs (with a limited capacity) is allocated in snmp_engine_get_bulk(). When snmp_engine_get_bulk() is populating the stack buffer, an overflow condition may occur due to lack of input length validation. This makes it possible to overwrite stack regions beyond the allocated buffer, including the return address from the function. As a result, the code execution path may be redirected to an address provided in the SNMP bulk get payload. If the target architecture uses common addressing space for program and data memory, it may also be possible to supply code in the SNMP request payload, and redirect the execution path to the remotely injected code, by modifying the function's return address. Contiki-NG Is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Contiki-NG is an open source cross-platform operating system for next-generation IoT (Internet of Things) devices. Contiki-NG version 4.4 to version 4.5 has a buffer error vulnerability. The vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in incorrect read and write operations to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow
VAR-202008-0626 CVE-2020-14937 Contiki-NG Out-of-bounds read vulnerability in CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
Memory access out of buffer boundaries issues was discovered in Contiki-NG 4.4 through 4.5, in the SNMP BER encoder/decoder. The length of provided input/output buffers is insufficiently verified during the encoding and decoding of data. This may lead to out-of-bounds buffer read or write access in BER decoding and encoding functions. Contiki-NG There is an out-of-bounds read vulnerability and an out-of-bounds write vulnerability in.Information is obtained and service operation is interrupted (DoS) It may be put into a state. Contiki-NG is an open source cross-platform operating system for next-generation IoT (Internet of Things) devices. Contiki-NG version 4.4 to version 4.5 has a buffer error vulnerability. The vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in incorrect read and write operations to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow
VAR-202008-0625 CVE-2020-14936 Contiki-NG Out-of-bounds write vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP agent. Functions parsing the OIDs in SNMP requests lack sufficient allocated target-buffer capacity verification when writing parsed OID values. The function snmp_oid_decode_oid() may overwrite memory areas beyond the provided target buffer, when called from snmp_message_decode() upon an SNMP request reception. Because the content of the write operations is externally provided in the SNMP requests, it enables a remote overwrite of an IoT device's memory regions beyond the allocated buffer. This overflow may allow remote overwrite of stack and statically allocated variables memory regions by sending a crafted SNMP request. Contiki-NG Is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Contiki-NG is an open source cross-platform operating system for next-generation IoT (Internet of Things) devices. The vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in incorrect read and write operations to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow
VAR-202008-1057 CVE-2020-5385 Dell Encryption and Dell Endpoint Security Suite Vulnerability in improper permission assignment for critical resources in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Dell Encryption versions prior to 10.8 and Dell Endpoint Security Suite versions prior to 2.8 contain a privilege escalation vulnerability because of an incomplete fix for CVE-2020-5358. A local malicious user with low privileges could potentially exploit this vulnerability to gain elevated privilege on the affected system with the help of a symbolic link. (DoS) It may be put into a state. Dell Encryption is a suite of data protection solutions. The product includes features such as compliance management, authentication, disk data encryption, and port encryption. The product supports features such as automated threat prevention, detection, and response
VAR-202008-0979 CVE-2020-8232 EdgeMax EdgeSwitch Information leakage vulnerability in firmware CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An information disclosure vulnerability exists in EdgeMax EdgeSwitch firmware v1.9.0 that allowed read only users could obtain unauthorized information through SNMP community pages. EdgeMax EdgeSwitch There is an information leakage vulnerability in the firmware.Information may be obtained. Ubiquiti Networks EdgeMAX EdgeSwitch is a PoE+ Gigabit switch from Ubiquiti Networks
VAR-202008-0023 CVE-2020-13122 NoviFlow NoviWare In OS Command injection vulnerabilities CVSS V2: 8.0
CVSS V3: 8.8
Severity: HIGH
The novish command-line interface, included in NoviFlow NoviWare before NW500.2.12 and deployed on NoviSwitch devices, is vulnerable to command injection in the "show status destination ipaddr" command. This could be used by a read-only user (monitoring group) or admin to execute commands on the operating system. NoviFlow NoviWare To OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
VAR-202008-0980 CVE-2020-8233 Ubiquiti Networks EdgeSwitch operating system command injection vulnerability CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
A command injection vulnerability exists in EdgeSwitch firmware <v1.9.0 that allowed an authenticated read-only user to execute arbitrary shell commands over the HTTP interface, allowing them to escalate privileges. EdgeSwitch For firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Ubiquiti Networks EdgeSwitch is a gigabit network switch device of Ubiquiti Networks
VAR-202008-1043 CVE-2020-9233 FusionCompute Authentication vulnerabilities in CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
FusionCompute 8.0.0 have an insufficient authentication vulnerability. An attacker may exploit the vulnerability to delete some files and cause some services abnormal. FusionCompute There is an authentication vulnerability in.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. Huawei FusionCompute is a computer virtualization engine of China's Huawei (Huawei) company. The product provides virtual resource manager (VRM) and compute node agent (CNA), etc
VAR-202008-1055 CVE-2020-9103 HUAWEI Mate 20 Vulnerabilities in smartphones CVSS V2: 2.1
CVSS V3: 4.6
Severity: MEDIUM
HUAWEI Mate 20 smartphones with 9.0.0.205(C00E205R2P1) have a logic error vulnerability. In a special scenario, the system does not properly process. As a result, attackers can perform a series of operations to successfully establish P2P connections that are rejected by the peer end. As a result, the availability of the device is affected. HUAWEI Mate 20 There are unspecified vulnerabilities in smartphones.Service operation interruption (DoS) It may be put into a state. Huawei Mate 20 is a smartphone of China's Huawei (Huawei) company. An attacker can use this vulnerability to achieve a successful connection when the object refuses the P2P connection
VAR-202008-1278 No CVE Mijia smart platform of Xiaomi Technology Co., Ltd. has unauthorized access vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Mijia Intelligent Platform is an intelligent hardware platform. Mijia Intelligent Platform of Xiaomi Technology Co., Ltd. has an unauthorized access vulnerability. Attackers can use the vulnerability to obtain sensitive information and perform unauthorized operations.
VAR-202008-1279 No CVE Unauthorized access vulnerability exists in Suning Intelligent Platform CVSS V2: 5.5
CVSS V3: -
Severity: MEDIUM
Suning Tesco Group Co., Ltd., founded on December 26, 1990, is headquartered in Nanjing. It is a leader in Chinese commercial enterprises. Its products cover traditional home appliances, consumer electronics, department stores, daily necessities, books, virtual products and other comprehensive categories. An unauthorized access vulnerability exists in the Suning Intelligent Platform, which can be exploited by attackers to obtain sensitive information.
VAR-202008-1317 No CVE VxWorks 5.5 has a buffer overflow vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
VxWorks is a real-time operating system launched by Wind River Systems, Inc. of the United States. VxWorks 5.5 has a buffer overflow vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202008-1319 No CVE Vxworks 5.5 has a clickjacking vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
VxWorks is a real-time operating system launched by Wind River Systems, Inc. of the United States. Vxworks 5.5 has a clickjacking vulnerability, which can be exploited by attackers to cause a denial of service.
VAR-202008-1325 No CVE Schneider TM241CE40T_U has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Schneider Electric (China) Co., Ltd. is a global leader in energy efficiency management, founded in 1836 by the Schneider brothers. Schneider TM241CE40T_U has a denial of service vulnerability, which can be exploited by attackers to make the system denial of service.
VAR-202008-1321 No CVE Advantech WebAccessNode has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Advantech WebAccessNode is a HMI/SCADA monitoring software based entirely on IE browser. Advantech (China) Co., Ltd. Advantech WebAccessNode has a denial of service vulnerability. Attackers can use this vulnerability to cause a system denial of service.
VAR-202008-0511 CVE-2020-22722 Rapid Software LLC Rapid SCADA Vulnerability in unlimited upload of dangerous types of files in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Rapid Software LLC Rapid SCADA 5.8.0 is affected by a local privilege escalation vulnerability in the ScadaAgentSvc.exe executable file. An attacker can obtain admin privileges by placing a malicious .exe file in the application and renaming it ScadaAgentSvc.exe, which would result in executing the binary as NT AUTHORITY\SYSTEM in a Windows operating system. For example, an attacker can plant a reverse shell from a low privileged user account and by restarting the computer, the malicious service will be started as NT AUTHORITY\SYSTEM by giving the attacker full system access to the remote PC. (DoS) It may be put into a state. Rapid SCADA is a free, open source, and fully functional SCADA (Data Acquisition and Monitoring System) software