VARIoT IoT vulnerabilities database
| VAR-202006-1910 | No CVE | Advantech WebAccess/SCADA has command execution vulnerability (CNVD-2020-29400) |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).
Advantech WebAccess/SCADA has a command execution vulnerability that an attacker can use to execute malicious code.
| VAR-202006-1911 | No CVE | Advantech WebAccess/SCADA has arbitrary file deletion vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability, which can be exploited by an attacker to delete arbitrary files on the server.
| VAR-202006-1912 | No CVE | Advantech WebAccess/SCADA has command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).
Advantech WebAccess/SCADA has a command execution vulnerability that an attacker can use to execute malicious code.
| VAR-202006-1889 | No CVE | Advantech WebAccess/SCADA has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).
There is a denial of service vulnerability in Advantech WebAccess/SCADA, which can be exploited by an attacker to cause the program to crash.
| VAR-202006-1918 | No CVE | WideField2 has command execution vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
WideField2 is a PLC programming software developed by Yokogawa Electric Group.
WideField2 has a command execution vulnerability, which can be exploited by attackers to gain server permissions.
| VAR-202006-0319 | CVE-2020-12021 | OSIsoft Made PI Web API 2019 Cross-site scripting vulnerability in |
CVSS V2: 6.0 CVSS V3: 9.0 Severity: CRITICAL |
In OSIsoft PI Web API 2019 Patch 1 (1.12.0.6346) and all previous versions, the affected product is vulnerable to a cross-site scripting attack, which may allow an attacker to remotely execute arbitrary code. PI Web API Is PI System Used when accessing RESTful The interface. This product supports client applications to read and write access to its AF and PI data via HTTPS
| VAR-202006-0317 | CVE-2020-11999 | Rockwell Automation Made FactoryTalk Linx Software Multiple vulnerabilities in |
CVSS V2: 5.5 CVSS V3: 8.1 Severity: Critical |
FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and later, Studio 5000 Launcher: Version 31 and later Stud, 5000 Logix Designer software: Version 32 and prior is vulnerable. An exposed API call allows users to provide files to be processed without sanitation. This may allow an attacker to specify a filename to execute unauthorized code and modify files or data. Rockwell Automation Provided by the company FactoryTalk Linx Software The following multiple vulnerabilities exist in. * Improper input confirmation (CWE-20) - CVE-2020-11999 * Improper input confirmation (CWE-20) - CVE-2020-12001 * Directory traversal (CWE-22) - CVE-2020-12003 * Upload any file (CWE-434) - CVE-2020-12005The expected impact depends on each vulnerability, but it may be affected as follows. * API Arbitrary code may be executed or files or data may be tampered with by a remote third party because arbitrary files are not properly sanitized during a call. - CVE-2020-11999 * Proper sanitization of specially crafted files can lead to sensitive information being stolen or arbitrary code being executed by a remote third party. - CVE-2020-12001 * API Sensitive information on the local hard drive is stolen by a remote third party because it does not properly sanitize the specially crafted request during the call. - CVE-2020-12003 * Improperly compressed by a remote third party EDF By uploading the file, the compressed file can be decompressed. CPU All resources are consumed and service operation is interrupted (DoS) The condition is triggered - CVE-2020-12005. Rockwell Automation RSLinx Classic and others are products of Rockwell Automation (USA). Rockwell Automation RSLinx Classic is a set of industrial communication solutions. Rockwell Automation ControlFLASH is a firmware update utility
| VAR-202006-0362 | CVE-2020-12003 | Rockwell Automation Made FactoryTalk Linx Software Multiple vulnerabilities in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: Critical |
FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and later, Studio 5000 Launcher: Version 31 and later Stud, 5000 Logix Designer software: Version 32 and prior is vulnerable. An exposed API call allows users to provide files to be processed without sanitation. This may allow an attacker to use specially crafted requests to traverse the file system and expose sensitive data on the local hard drive. Rockwell Automation Provided by the company FactoryTalk Linx Software The following multiple vulnerabilities exist in. * Improper input confirmation (CWE-20) - CVE-2020-11999 * Improper input confirmation (CWE-20) - CVE-2020-12001 * Directory traversal (CWE-22) - CVE-2020-12003 * Upload any file (CWE-434) - CVE-2020-12005The expected impact depends on each vulnerability, but it may be affected as follows. * API Arbitrary code may be executed or files or data may be tampered with by a remote third party because arbitrary files are not properly sanitized during a call. - CVE-2020-11999 * Proper sanitization of specially crafted files can lead to sensitive information being stolen or arbitrary code being executed by a remote third party. - CVE-2020-12003 * Improperly compressed by a remote third party EDF By uploading the file, the compressed file can be decompressed. CPU All resources are consumed and service operation is interrupted (DoS) The condition is triggered - CVE-2020-12005. Rockwell Automation RSLinx Classic and others are products of Rockwell Automation (USA). Rockwell Automation RSLinx Classic is a set of industrial communication solutions. Rockwell Automation ControlFLASH is a firmware update utility
| VAR-202006-0364 | CVE-2020-12005 | Rockwell Automation Made FactoryTalk Linx Software Multiple vulnerabilities in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: Critical |
FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and later, Studio 5000 Launcher: Version 31 and later Stud, 5000 Logix Designer software: Version 32 and prior is vulnerable. A vulnerability exists in the communication function that enables users to upload EDS files by FactoryTalk Linx. This may allow an attacker to upload a file with bad compression, consuming all the available CPU resources, leading to a denial-of-service condition. Rockwell Automation Provided by the company FactoryTalk Linx Software The following multiple vulnerabilities exist in. * Improper input confirmation (CWE-20) - CVE-2020-11999 * Improper input confirmation (CWE-20) - CVE-2020-12001 * Directory traversal (CWE-22) - CVE-2020-12003 * Upload any file (CWE-434) - CVE-2020-12005The expected impact depends on each vulnerability, but it may be affected as follows. * API Arbitrary code may be executed or files or data may be tampered with by a remote third party because arbitrary files are not properly sanitized during a call. - CVE-2020-11999 * Proper sanitization of specially crafted files can lead to sensitive information being stolen or arbitrary code being executed by a remote third party. - CVE-2020-12001 * API Sensitive information on the local hard drive is stolen by a remote third party because it does not properly sanitize the specially crafted request during the call. - CVE-2020-12003 * Improperly compressed by a remote third party EDF By uploading the file, the compressed file can be decompressed. CPU All resources are consumed and service operation is interrupted (DoS) The condition is triggered - CVE-2020-12005. Rockwell Automation RSLinx Classic and others are products of Rockwell Automation (USA). Rockwell Automation RSLinx Classic is a set of industrial communication solutions. Rockwell Automation ControlFLASH is a firmware update utility
| VAR-202007-1403 | CVE-2020-5901 | NGINX Controller Cross-site scripting vulnerability in |
CVSS V2: 9.3 CVSS V3: 9.6 Severity: CRITICAL |
In NGINX Controller 3.3.0-3.4.0, undisclosed API endpoints may allow for a reflected Cross Site Scripting (XSS) attack. If the victim user is logged in as admin this could result in a complete compromise of the system. NGINX Controller Exists in a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. F5 NGINX Controller is a centralized monitoring and management platform for NGINX from F5 Corporation in the United States. The platform supports managing multiple NGINX instances using a visual interface. An attacker could exploit this vulnerability with a specially crafted URL to run JavaScript in the context of the currently logged-in user, potentially gaining full access to the system if the user is logged in as an administrator
| VAR-202007-1402 | CVE-2020-5900 | NGINX Controller Cross-site request forgery vulnerability in |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
In versions 3.0.0-3.4.0, 2.0.0-2.9.0, and 1.0.1, there is insufficient cross-site request forgery (CSRF) protections for the NGINX Controller user interface. (DoS) It may be put into a state. F5 NGINX Controller is a centralized monitoring and management platform for NGINX from F5 Corporation in the United States. The platform supports managing multiple NGINX instances using a visual interface. An attacker could exploit this vulnerability by enticing a user to click a malicious link to perform arbitrary operations on the user's web interface
| VAR-202007-1401 | CVE-2020-5899 | NGINX Controller Vulnerability related to password management function in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code. NGINX Controller Contains a vulnerability related to the password management function.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. F5 NGINX Controller is a centralized monitoring and management platform for NGINX from F5 Corporation in the United States. The platform supports managing multiple NGINX instances using a visual interface. An attacker can exploit this vulnerability to change the user's password. If the user is an administrator user, the attacker can completely control the NGINX Controller system
| VAR-202006-0320 | CVE-2020-12023 | Philips Made IntelliBridge Enterprise (IBE) Vulnerability regarding information leakage from log files in |
CVSS V2: 2.7 CVSS V3: 4.5 Severity: MEDIUM |
Philips IntelliBridge Enterprise (IBE), Versions B.12 and prior, IntelliBridge Enterprise system integration with SureSigns (VS4), EarlyVue (VS30) and IntelliVue Guardian (IGS). Unencrypted user credentials received in the IntelliBridge Enterprise (IBE) are logged within the transaction logs, which are secured behind the login based administrative web portal. The unencrypted user credentials sent from the affected products listed above, for the purpose of handshake or authentication with the Enterprise Systems, are logged as the payload in IntelliBridge Enterprise (IBE) within the transaction logs. An attacker with administrative privileges could exploit this vulnerability to read plain text credentials from log files. Philips Made IntelliBridge Enterprise (IBE) Exists in a vulnerability related to information leakage from log files. Philips IntelliBridge Enterprise (IBE) is a solution from Philips of the Netherlands that provides a single point of contact between EHR (electronic health records) and Philips clinical solutions
| VAR-202006-0176 | CVE-2020-13702 | The Rolling Proximity Identifier Vulnerability regarding information leakage in |
CVSS V2: 6.4 CVSS V3: 10.0 Severity: CRITICAL |
The Rolling Proximity Identifier used in the Apple/Google Exposure Notification API beta through 2020-05-29 enables attackers to circumvent Bluetooth Smart Privacy because there is a secondary temporary UID. An attacker with access to Beacon or IoT networks can seamlessly track individual device movement via a Bluetooth LE discovery mechanism. ** Unsettled ** This case has not been confirmed as a vulnerability. The Rolling Proximity Identifier There is an information leakage vulnerability in. Vendors have challenged this vulnerability. For more information, please see below NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2020-13702Information may be obtained
| VAR-202006-0250 | CVE-2020-0535 | Intel(R) AMT Input verification vulnerability in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access. Intel(R) AMT There is an input verification vulnerability in.Information may be obtained. Intel Active Management Technology (AMT) is a set of hardware-based computer remote active management technology software developed by Intel Corporation. A remote attacker could exploit this vulnerability to obtain information. The following products and versions are affected: Intel AMT versions prior to 11.8.76, versions prior to 11.12.77, versions prior to 11.22.77, and versions prior to 12.0.64
| VAR-202006-1891 | No CVE | Unauthorized access vulnerability exists in Changyuan Shenrui PRS-7910 data gateway |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Changyuan Shenrui PRS-7910 Data Gateway is an Ethernet-based data gateway launched by Changyuan Shenrui Automation Automation Co., Ltd.
An unauthorized access vulnerability exists in the Changyuan Shenrui PRS-7910 data gateway machine, which can be used by attackers to obtain sensitive information.
| VAR-202006-1573 | CVE-2020-5362 | Select Dell Client Consumer and Commercial Vulnerability in lack of authentication on platform |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
Dell Client Consumer and Commercial platforms include an improper authorization vulnerability in the Dell Manageability interface for which an unauthorized actor, with local system access with OS administrator privileges, could bypass the BIOS Administrator authentication to restore BIOS Setup configuration to default values. Select Dell Client Consumer and Commercial The platform is vulnerable to lack of authentication.Information may be tampered with
| VAR-202006-1717 | CVE-2020-9076 | plural Huawei Authentication vulnerabilities in smartphone products |
CVSS V2: 4.0 CVSS V3: 6.8 Severity: MEDIUM |
HUAWEI P30;HUAWEI P30 Pro;Tony-AL00B smartphones with versions earlier than 10.1.0.135(C00E135R2P11); versions earlier than 10.1.0.135(C00E135R2P8), versions earlier than 10.1.0.135 have an improper authentication vulnerability. Due to the identity of the message sender not being properly verified, an attacker can exploit this vulnerability through man-in-the-middle attack to induce user to access malicious URL. HUAWEI P30 , P30 Pro , Tony-AL00B There is an authentication vulnerability in.Information may be obtained and tampered with. Huawei P30, etc. are all smart phones of China's Huawei (Huawei) company
| VAR-202006-1596 | CVE-2020-7670 | agoo In HTTP Request Smagling Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
agoo prior to 2.14.0 allows request smuggling attacks where agoo is used as a backend and a frontend proxy also being vulnerable. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks where `agoo` is used as part of a chain of backend servers due to insufficient `Content-Length` and `Transfer Encoding` parsing. agoo To HTTP There is a vulnerability related to Request Smagling.Information may be tampered with. agoo is a Ruby-based HTTP server by Peter Ohler software developer.
There is an environmental issue vulnerability in agoo 2.12.3 and earlier versions
| VAR-202006-1778 | CVE-2020-6090 | WAGO PFC 200 Vulnerability related to authority management in |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
An exploitable code execution vulnerability exists in the Web-Based Management (WBM) functionality of WAGO PFC 200 03.03.10(15). A specially crafted series of HTTP requests can cause code execution resulting in remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAGO PFC 200 Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. WAGO PFC 200 is a programmable logic controller (PLC) made by WAGO in Germany