VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202412-3428 No CVE Epson (China) Co., Ltd. L15160 Series has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The L15160 Series is a multi-function printer designed for small and medium-sized office groups. Epson (China) Co., Ltd. L15160 Series has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202412-0653 No CVE Siemens Opcenter Execution Foundation Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
Opcenter Execution Foundation is a manufacturing execution system (MES) software launched by Siemens, which is mainly used to monitor and synchronize the manufacturing activities of all factories around the world. The software implements low-code personalization through embedded Mendix technology, allowing users to customize and develop systems suitable for specific production scenarios according to their own needs. Siemens Opcenter Execution Foundation has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-0834 No CVE Siemens SIMATIC PCS neo Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
SIMATIC PCS neo is a fully web-based process control system. Siemens SIMATIC PCS neo has a buffer overflow vulnerability that can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-2941 No CVE Siemens Opcenter Intelligence Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
Opcenter Intelligence‌ is a manufacturing intelligence solution launched by Siemens, which aims to improve the efficiency and quality of the manufacturing process through big data analysis. The solution provides a variety of products and services to meet the needs of different users. Siemens Opcenter Intelligence has a buffer overflow vulnerability, which can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-3429 No CVE Samsung (China) Investment Co., Ltd. C145x-Series has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Samsung (China) Investment Co., Ltd. is an enterprise mainly engaged in business services. Samsung (China) Investment Co., Ltd. C145x-Series has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202412-3098 No CVE Siemens SINEC NMS Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
SINEC NMS is a network management system (NMS) that can scale to handle network structures of all sizes in an increasingly digital world. The system can be used to centrally monitor, manage and configure industrial networks covering tens of thousands of devices around the clock, including safety-related areas. A buffer overflow vulnerability exists in Siemens SINEC NMS that can be exploited by an unauthenticated remote attacker to execute arbitrary code.
VAR-202412-3099 No CVE Siemens Totally Integrated Automation Portal (TIA Portal) Buffer Overflow Vulnerability CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
Totally Integrated Automation Portal (TIA Portal) is an integrated automation platform that provides a full range of digital automation services from digital planning to integrated engineering and transparent operation. TIA Portal is designed to shorten time to market, improve factory production efficiency, and increase system flexibility. It includes innovative simulation tools, seamlessly integrated engineering functions, and transparent operation management, and is particularly suitable for system integrators, machine manufacturers, and factory operators. Siemens Totally Integrated Automation Portal (TIA Portal) has a buffer overflow vulnerability that can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-2239 CVE-2024-47238 Vulnerabilities in multiple Dell products CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution. Embedded Box PC 3000 firmware, Dell Edge Gateway 3001 firmware, Dell Edge Gateway 3002 Unspecified vulnerabilities exist in multiple Dell products, including firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202412-1095 CVE-2024-46341 TP-LINK Technologies  of  TL-WR845N  Insufficient Credential Protection Vulnerability in Firmware CVSS V2: 7.7
CVSS V3: 8.0
Severity: HIGH
TP-Link TL-WR845N(UN)_V4_190219 was discovered to transmit credentials in base64 encoded form, which can be easily decoded by an attacker executing a man-in-the-middle attack. TP-LINK Technologies of TL-WR845N A firmware vulnerability related to insufficient protection of credentials exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK WR845N is a wireless router from China's TP-LINK company
VAR-202412-0457 CVE-2024-53832 Siemens SICAM A8000 CP-8031 and CP-8050 Firmware Decryption Vulnerability CVSS V2: 6.1
CVSS V3: 4.6
Severity: Medium
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V05.30). The affected devices contain a secure element which is connected via an unencrypted SPI bus. This could allow an attacker with physical access to the SPI bus to observe the password used for the secure element authentication, and then use the secure element as an oracle to decrypt all encrypted update files. SICAM A8000 RTU (Remote Terminal Unit) is a modular device for remote control and automation applications in all energy supply sectors
VAR-202412-0349 CVE-2024-53242 Siemens Tecnomatix Plant Simulation WRL File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability CVSS V2: 6.0
CVSS V3: 7.8
Severity: High
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25206). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files in the wrltojt module. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production throughput and improve manufacturing system performance
VAR-202412-0348 CVE-2024-53041 Siemens Tecnomatix Plant Simulation WRL File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: High
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain a stack based overflow vulnerability while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25000). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files in the wrltojt module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume and improve manufacturing system performance
VAR-202412-0387 CVE-2024-52051 Siemens Engineering Platforms Local Arbitrary Code Execution Vulnerability CVSS V2: 6.8
CVSS V3: 7.3
Severity: High
A vulnerability has been identified in SIMATIC S7-PLCSIM V17 (All versions), SIMATIC S7-PLCSIM V18 (All versions), SIMATIC STEP 7 Safety V17 (All versions), SIMATIC STEP 7 Safety V18 (All versions), SIMATIC STEP 7 Safety V19 (All versions < V19 Update 4), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions < V19 Update 4), SIMATIC WinCC Unified PC Runtime V18 (All versions), SIMATIC WinCC Unified PC Runtime V19 (All versions < V19 Update 4), SIMATIC WinCC Unified V17 (All versions), SIMATIC WinCC Unified V18 (All versions), SIMATIC WinCC Unified V19 (All versions < V19 Update 4), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions < V19 Update 4), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOTION SCOUT TIA V5.4 (All versions), SIMOTION SCOUT TIA V5.5 (All versions), SIMOTION SCOUT TIA V5.6 (All versions < V5.6 SP1 HF7), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions < V5.2.1.1). The affected devices do not properly sanitize user-controllable input when parsing user settings. This could allow an attacker to locally execute arbitrary commands in the host operating system with the privileges of the user. Totally Integrated Automation Portal (TIA Portal) is a PC software that provides the full range of Siemens digital automation services, from digital planning, integrated engineering to transparent operation
VAR-202412-0388 CVE-2024-49849 Siemens Engineering Platforms Deserialization Vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: High
A vulnerability has been identified in SIMATIC S7-PLCSIM V16 (All versions), SIMATIC S7-PLCSIM V17 (All versions), SIMATIC STEP 7 Safety V16 (All versions), SIMATIC STEP 7 Safety V17 (All versions), SIMATIC STEP 7 Safety V18 (All versions), SIMATIC STEP 7 Safety V19 (All versions < V19 Update 4), SIMATIC STEP 7 V16 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions < V19 Update 4), SIMATIC WinCC Unified V16 (All versions), SIMATIC WinCC Unified V17 (All versions), SIMATIC WinCC Unified V18 (All versions), SIMATIC WinCC Unified V19 (All versions < V19 Update 4), SIMATIC WinCC V16 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions < V19 Update 4), SIMOCODE ES V16 (All versions), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOTION SCOUT TIA V5.4 (All versions), SIMOTION SCOUT TIA V5.5 (All versions), SIMOTION SCOUT TIA V5.6 (All versions < V5.6 SP1 HF7), SINAMICS Startdrive V16 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), TIA Portal Cloud V16 (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions < V5.2.1.1). Affected products do not properly sanitize user-controllable input when parsing log files. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application. SIMATIC S7-PLCSIM simulates S7-1200, S7-1500 and some other PLC derivatives and is shipped as part of SIMATIC STEP 7. SIMATIC STEP 7 (TIA Portal) is an engineering software for configuring and programming SIMATIC controllers. SIMOCODE ES is the central software package for configuration, commissioning, operation and diagnostics of SIMOCODE-pro. SINAMICS Startdrive commissioning software is the engineering tool for integrating SINAMICS drives in TIA Portal. Totally Integrated Automation Portal (TIA Portal) is a PC software that offers the complete range of Siemens digital automation services, from digital planning and integrated engineering to transparent operation. TIA Portal Cloud makes it possible to use the main and main option packages of TIA Portal in a virtualized environment. Local projects can be transferred to the cloud and reloaded via file sharing services
VAR-202412-0442 CVE-2020-28398 Siemens RUGGEDCOM ROX II Cross-Site Request Forgery Vulnerability CVSS V2: 10.0
CVSS V3: 8.8
Severity: High
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). The CLI feature in the web interface of affected devices is vulnerable to cross-site request forgery (CSRF). This could allow an attacker to read or modify the device configuration by tricking an authenticated legitimate user into accessing a malicious link. RUGGEDCOM ROX II is a ROX-based VPN endpoint and firewall device used to connect devices operating in harsh environments, such as power substations and traffic control cabinets
VAR-202412-0460 CVE-2024-12352 TOTOLINK  of  ex1800t  Out-of-bounds write vulnerability in firmware CVSS V2: 4.0
CVSS V3: 4.3
Severity: Medium
A vulnerability classified as problematic was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This vulnerability affects the function sub_40662C of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of ex1800t An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK EX1800T is a Wi-Fi range extender from China's TOTOLINK Electronics. There is a stack overflow vulnerability in the cstecgi.cgi sub_40662C of the TOTOLINK EX1800T. The vulnerability is caused by the ssid parameter of the sub_40662C function of the /cgi-bin/cstecgi.cgi file failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202412-0464 CVE-2024-12344 TP-LINK Technologies  of  vn020 f3v  Out-of-bounds write vulnerability in firmware CVSS V2: 6.5
CVSS V3: 6.3
Severity: Medium
A vulnerability, which was classified as critical, was found in TP-Link VN020 F3v(T) TT_V6.2.1021. This affects an unknown part of the component FTP USER Command Handler. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. TP-LINK Technologies of vn020 f3v An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK VN020 is a wireless modem from TP-LINK of China. Unauthenticated attackers can exploit this vulnerability to execute arbitrary code
VAR-202412-0376 CVE-2024-12343 TP-LINK Technologies  of  vn020 f3v  Buffer error vulnerability in firmware CVSS V2: 6.1
CVSS V3: 6.5
Severity: High
A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. TP-LINK Technologies of vn020 f3v The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK VN020 is a wireless modem from TP-LINK of China
VAR-202412-1837 CVE-2024-54747 WAVLINK WN531P3 Hard-coded Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
WAVLINK WN531P3 202383 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. WAVLINK WN531P3 is a router developed by WAVLINK, a Chinese company
VAR-202412-0853 CVE-2024-54745 WAVLINK WN701AE Hard-coded Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
WAVLINK WN701AE M01AE_V240305 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. WAVLINK WN701AE is a router developed by WAVLINK, a Chinese company