VARIoT IoT vulnerabilities database
| VAR-202007-1285 | CVE-2020-5374 | Dell EMC OpenManage Integration for Microsoft System Center for SCCM and SCVMM Vulnerability in Using Hard Coded Credentials |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Dell EMC OpenManage Integration for Microsoft System Center (OMIMSSC) for SCCM and SCVMM versions prior to 7.2.1 contain a hard-coded cryptographic key vulnerability. A remote unauthenticated attacker may exploit this vulnerability to gain access to the appliance data for remotely managed devices
| VAR-202007-1284 | CVE-2020-5373 | Dell EMC OpenManage Integration for Microsoft System Center for SCCM and SCVMM Vulnerability regarding lack of authentication for critical features in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Dell EMC OpenManage Integration for Microsoft System Center (OMIMSSC) for SCCM and SCVMM versions prior to 7.2.1 contain an improper authentication vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to retrieve the system inventory data of the managed device. The vulnerability is caused by the program not properly authenticating users
| VAR-202007-0396 | CVE-2020-14499 | Advantech iView Vulnerability regarding inadequate protection of credentials in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful exploitation of this vulnerability may allow an attacker to obtain all user accounts credentials. Advantech iView Exists in an inadequate protection of credentials.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability.The specific flaw exists within the UserServlet class
| VAR-202007-1472 | No CVE | UFIDA Network Technology Co., Ltd. UFIDA NC Cloud has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
NC Cloud is a new generation of cloud ERP products developed by UFIDA's IoT, big data, artificial intelligence and other technologies.
Yonyou Network Technology Co., Ltd. Yonyou NC Cloud has an unauthorized access vulnerability, which can be exploited by attackers to cause data information leakage.
| VAR-202007-1495 | No CVE | Proficy Machine Edition has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Proficy Machine Edition is a PLC programming software developed by Emerson Trading (Shanghai) Co., Ltd.
Proficy Machine Edition has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
| VAR-202007-0063 | CVE-2020-10986 | Tenda AC15 AC1900 cross-site request forgery vulnerability |
CVSS V2: 7.1 CVSS V3: 6.5 Severity: MEDIUM |
A CSRF issue in the /goform/SysToolReboot endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to reboot the device and cause denial of service via a payload hosted by an attacker-controlled web page. Tenda AC15 AC1900 Exists in a cross-site request forgery vulnerability.Service operation interruption (DoS) It may be put into a state. Tenda AC15 AC1900 is a wireless router of China Tenda (Tenda) company
| VAR-202007-0064 | CVE-2020-10987 | Tenda AC15 AC1900 Injection vulnerabilities in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter. Tenda AC15 AC1900 There is an injection vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Tenda AC15 AC1900 is a wireless router of China Tenda (Tenda) company
| VAR-202007-0066 | CVE-2020-10989 | Tenda AC15 AC1900 cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
An XSS issue in the /goform/WifiBasicSet endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute malicious payloads via the WifiName POST parameter. Tenda AC15 AC1900 Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with. Tenda AC15 AC1900 is a wireless router of China Tenda (Tenda) company
| VAR-202007-0065 | CVE-2020-10988 | Tenda AC15 AC1900 trust management issue vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device. Tenda AC15 AC1900 Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Tenda AC15 AC1900 is a wireless router of China Tenda (Tenda) company
| VAR-202007-1512 | No CVE | LTE digital cellular mobile communication network MME equipment has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
LTE digital cellular mobile communication network MME equipment is an important network element of the LTE core network and is responsible for processing signaling.
LTE digital cellular mobile communication network MME equipment has a denial of service vulnerability. An attacker can exploit the vulnerability to cause a denial of service attack.
| VAR-202007-1503 | No CVE | Delta ISPSoft isp project file has memory corruption vulnerability (CNVD-2020-33323) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
ISPSoft is a new generation of Delta PLC programming software.
Delta ISPSoft has a memory corruption vulnerability when processing isp project files. An attacker can trick a user who installs ISPSoft to open a malicious isp file, thereby triggering a vulnerability and causing the program to deny service.
| VAR-202007-1476 | No CVE | Dahua network keyboard and face integrated host have information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
DH-NHB5000 is a new generation full touch network keyboard independently designed and developed by Dahua.
Dahua network keyboard and face integrated host have information leakage vulnerability. Attackers can use vulnerabilities to bypass authentication and obtain sensitive information.
| VAR-202007-1488 | No CVE | TPEditor has a memory corruption vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
TPEditor is the programming software used by Delta Electronic Programmable Display Series in WINDOWS environment.
TPEditor has a memory corruption vulnerability. An attacker can trick a user who installs TPEditor to open a malicious tpe file, thereby triggering a vulnerability and causing the program to deny service.
| VAR-202007-0916 | CVE-2020-15504 | Sophos XG Firewall In SQL Injection vulnerabilities |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A SQL injection vulnerability in the user and admin web interfaces of Sophos XG Firewall v18.0 MR1 and older potentially allows an attacker to run arbitrary code remotely. The fix is built into the re-release of XG Firewall v18 MR-1 (named MR-1-Build396) and the v17.5 MR13 release. All other versions >= 17.0 have received a hotfix. (DoS) It may be put into a state. Sophos XG Firewall is a next-generation endpoint protection and enterprise-class firewall product from Sophos, UK. A remote attacker could exploit this vulnerability to execute arbitrary code
| VAR-202007-0192 | CVE-2020-12025 | Rockwell Automation Made Logix Designer Studio 5000 To XML Improper restriction vulnerability in external entity reference |
CVSS V2: 4.3 CVSS V3: 3.3 Severity: LOW |
Rockwell Automation Logix Designer Studio 5000 Versions 32.00, 32.01, and 32.02 vulnerable to an xml external entity (XXE) vulnerability, which may allow an attacker to view hostnames or other resources from the program. Rockwell Automation Provides Logix Designer Studio 5000 Is management software for control systems for industrial equipment. For the product XML Improper restriction vulnerability in external entity reference (CWE-611) Exists.If an unauthenticated third party creates and loads a specially crafted file, the system host name and resources may be leaked from the product. Authentication is not required to exploit this vulnerability.The specific flaw exists within the parsing of AML files. An attacker can leverage this vulnerability to disclose information in the context of the current process. The vulnerability stems from the program not properly restricting references to XML external entities. Attackers can use the vulnerability to view host names or other resources
| VAR-202007-0756 | CVE-2020-15001 | Yubico YubiKey 5 NFC Information Disclosure Vulnerability |
CVSS V2: 2.9 CVSS V3: 5.3 Severity: MEDIUM |
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when updating NFC specific components of the OTP configurations. This may allow an attacker to access configured OTPs and passwords stored in slots that were not configured by the user to be read over NFC, despite a user having set an access code. (Users who have not set an access code, or who have not configured the OTP slots, are not impacted by this issue.). Yubico YubiKey 5 NFC is a multi-protocol secret key device supporting NFC (Near Field Communication) function from Yubico, Sweden
| VAR-202007-0755 | CVE-2020-15000 | Yubico YubiKey 5 Vulnerabilities in devices |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
A PIN management problem was discovered on Yubico YubiKey 5 devices 5.2.0 to 5.2.6. OpenPGP has three passwords: Admin PIN, Reset Code, and User PIN. The Reset Code is used to reset the User PIN, but it is disabled by default. A flaw in the implementation of OpenPGP sets the Reset Code to a known value upon initialization. If the retry counter for the Reset Code is set to non-zero without changing the Reset Code, this known value can be used to reset the User PIN. To set the retry counters, the Admin PIN is required. Yubico YubiKey 5 An unspecified vulnerability exists in the device.Information may be tampered with. Yubico YubiKey 5 is a multi-protocol security key device from Yubico, Sweden.
The OpenPGP implementation in Yubico YubiKey 5 5.2.0 to 5.2.6 has an access control error vulnerability. The vulnerability stems from the network system or product improperly restricting access to resources from unauthorized roles
| VAR-202007-1255 | CVE-2020-9376 | D-Link DIR-610 information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1 to getcfg.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ** Not supported ** This issue is a vulnerability in an unsupported version. D-Link DIR-610 The device contains a vulnerability related to information leakage.Information may be obtained. D-Link DIR-610 is a wireless router made by D-Link in Taiwan.
There is an information disclosure vulnerability in D-Link DIR-610, which is caused by a configuration error in the network system or product during operation. Attackers can use it by sending SERVICES=DEVICE.ACCOUNT\%0AAUTHORIZED_GROUP=1 to the getcfg.php file This vulnerability leads to information disclosure
| VAR-202007-1256 | CVE-2020-9377 | D-Link DIR-610 Code injection vulnerability in device |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
D-Link DIR-610 devices allow Remote Command Execution via the cmd parameter to command.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ** Not supported ** This issue is a vulnerability in an unsupported version. D-Link DIR-610 A code injection vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. D-Link DIR-610 is a wireless router made by D-Link in Taiwan.
There is a remote code execution vulnerability in D-Link DIR-610. The vulnerability stems from the fact that the network system or product fails to properly filter the special elements in the process of constructing code segments with external input data. The attacker can send it to the command.php file. The'cmd' parameter uses this vulnerability to execute code
| VAR-202007-1427 | CVE-2020-1646 | Juniper Networks Junos OS and Junos OS Evolved Input verification vulnerabilities in devices |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) crash and restart. This issue occurs only when the device is receiving and processing the BGP UPDATE for an EBGP peer. This issue does not occur when the device is receiving and processing the BGP UPDATE for an IBGP peer. However, the offending BGP UPDATE can originally come from an EBGP peer, propagates through the network via IBGP peers without causing crash, then it causes RPD crash when it is processed for a BGP UPDATE towards an EBGP peer. Repeated receipt and processing of the same specific BGP UPDATE can result in an extended Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 17.3R3-S6, 17.4R2-S7, and 18.1R3-S7. Juniper Networks Junos OS Evolved 19.2R2-EVO and later versions, prior to 19.3R1-EVO. Other Junos OS releases are not affected. The operating system provides a secure programming interface and Junos SDK