VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201912-0099 CVE-2019-6682 BIG-IP APM Vulnerable to resource exhaustion CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
On versions 15.0.0-15.0.1.1, 14.0.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, the BIG-IP ASM system may consume excessive resources when processing certain types of HTTP responses from the origin web server. This vulnerability is only known to affect resource-constrained systems in which the security policy is configured with response-side features, such as Data Guard or response-side learning. BIG-IP APM Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP ASM is a Web Application Firewall (WAF) of F5 Corporation in the United States, which provides secure remote access, protects emails, simplifies Web access control, and enhances network and application performance. A security vulnerability exists in F5 BIG-IP ASM. A remote attacker can exploit this vulnerability to consume a large amount of resources, interrupt traffic processing, and cause a denial of service. The following products and versions are affected: F5 BIG-IP ASM version 15.0.0 to 15.0.1, 14.1.0 to 14.1.2, 13.1.0 to 13.1.3, 12.1.0 to 12.1.5 Version, 11.5.2 to 11.6.5
VAR-201912-0098 CVE-2019-6681 BIG-IP Vulnerabilities related to lack of effective post-lifetime resource release CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
On BIG-IP versions 15.0.0-15.0.1.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, and 12.1.0-12.1.5, a memory leak in Multicast Forwarding Cache (MFC) handling in tmrouted. BIG-IP Is vulnerable to a lack of free resources after a valid lifetime.Service operation interruption (DoS) There is a possibility of being put into a state
VAR-201912-2009 No CVE Xiaomi AI speaker-mDNS service has heap corruption vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Xiaomi AI speaker is a smart speaker product produced by Xiaomi. There is a heap corruption vulnerability in the Xiaomi AI Speaker-mDNS service. The vulnerability is due to the laxity of the boundary check when the program service parses the request message, resulting in arbitrary writing of the memory heap. An attacker could use the vulnerability to execute arbitrary code.
VAR-201912-2008 No CVE Xiaomi AI Speaker-Denial of Service Vulnerability in mDNS Service CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Xiaomi AI speaker is a smart speaker product produced by Xiaomi. There is a denial of service vulnerability in the Xiaomi AI Speaker-mDNS service. The vulnerability is caused by the program service failing to fully judge the malformed message when parsing the request message, causing the parsing thread to fall into an infinite loop. An attacker could use the vulnerability to launch a denial of service attack.
VAR-201912-2004 No CVE H3C ACG1000-M Switch Has Weak Password Vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Xinhua San Technology Co., Ltd. has the overall capabilities of a full range of digital infrastructures such as computing, storage, networking, and security, providing cloud computing, big data, intelligent connectivity, information security, new security, Internet of Things, edge computing, artificial intelligence, 5G, etc. One-stop digital solutions, as well as end-to-end technical services. H3C ACG1000-M switch has weak password vulnerability. Allows an attacker to log in to the background of the system to obtain sensitive information.
VAR-201912-1499 CVE-2019-15912 plural ASUS Input validation vulnerabilities in products CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An issue was discovered on ASUS HG100, MW100, WS-101, TS-101, AS-101, MS-101, DL-101 devices using ZigBee PRO. Attackers can use the ZigBee trust center rejoin procedure to perform mutiple denial of service attacks. plural ASUS The product contains an input validation vulnerability.Denial of service (DoS) May be in a state. ASUS SmartHome Gateway HG100 and other products are products of ASUS, Taiwan. ASUS SmartHome Gateway HG100 is a smart home central control gateway device. ASUS WS-101 is a smart switch sensor. TS-101 is a temperature / humidity sensor. There are security vulnerabilities in ASUS SmartHome Gateway HG100 version 1.05.12, WS-101 version 1.05.12, and TS-101 version 1.05.12 (using ZigBee PRO). An attacker could use this vulnerability to cause a denial of service
VAR-201912-1502 CVE-2019-15915 plural Xiaomi Input validation vulnerabilities in product devices CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An issue was discovered on Xiaomi DGNWG03LM, ZNCZ03LM, MCCGQ01LM, RTCGQ01LM devices. Attackers can utilize the "discover ZigBee network procedure" to perform a denial of service attack. plural Xiaomi The product device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Xiaomi DGNWG03LM and other products are products of Xiaomi China. Xiaomi DGNWG03LM is a smart home gateway device. ZNCZ03LM is a smart switch device. MCCGQ01LM is a smart remote control. There are security holes in several Xiaomi products
VAR-201912-0162 CVE-2019-4655 IBM MQ Input validation vulnerability CVSS V2: 4.0
CVSS V3: 4.3
Severity: Medium
IBM MQ 9.1.0.0, 9.1.0.1, 9.1.0.2, 9.1.0.3, 9.1.1, 9.1.2, and 9.1.3 is vulnerable to a denial of service attack that would allow an authenticated user to reset client connections due to an error within the Data Conversion routine. IBM X-Force ID: 170966. IBM MQ Contains an input validation vulnerability. Vendors have confirmed this vulnerability IBM X-Force ID: 170966 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state
VAR-201912-1498 CVE-2019-15911 plural ASUS Vulnerability in sending clear information of important information in products CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on ASUS HG100, MW100, WS-101, TS-101, AS-101, MS-101, DL-101 devices using ZigBee PRO. Because of insecure key transport in ZigBee communication, attackers can obtain sensitive information, cause the multiple denial of service attacks, take over smart home devices, and tamper with messages. plural ASUS The product contains a vulnerability in transmitting sensitive information in the clear.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. ASUS SmartHome Gateway HG100 and other products are products of ASUS, Taiwan. ASUS SmartHome Gateway HG100 is a smart home central control gateway device. ASUS WS-101 is a smart switch sensor. TS-101 is a temperature / humidity sensor. There are security vulnerabilities in ASUS SmartHome Gateway HG100 version 1.05.12, WS-101 version 1.05.12 and TS-101 version 1.05.12 (using ZigBee PRO), which originated from the program's insecure transmission of keys
VAR-201912-1500 CVE-2019-15913 plural Xiaomi Vulnerability in authentication bypass by user control key in product device CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on Xiaomi DGNWG03LM, ZNCZ03LM, MCCGQ01LM, WSDCGQ01LM, RTCGQ01LM devices. Because of insecure key transport in ZigBee communication, causing attackers to gain sensitive information and denial of service attack, take over smart home devices, and tamper with messages. plural Xiaomi The product device contains a vulnerability related to authentication bypass by the user control key.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Xiaomi DGNWG03LM and other products are products of Xiaomi China. Xiaomi DGNWG03LM is a smart home gateway device. ZNCZ03LM is a smart switch device. MCCGQ01LM is a smart remote control. There are security vulnerabilities in several Xiaomi products, which stem from the program's insecure transmission of keys
VAR-201912-1501 CVE-2019-15914 plural Xiaomi Input validation vulnerabilities in product devices CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An issue was discovered on Xiaomi DGNWG03LM, ZNCZ03LM, MCCGQ01LM, WSDCGQ01LM, RTCGQ01LM devices. Attackers can use the ZigBee trust center rejoin procedure to perform mutiple denial of service attacks. plural Xiaomi The product device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Xiaomi DGNWG03LM and other products are products of Xiaomi China. Xiaomi DGNWG03LM is a smart home gateway device. ZNCZ03LM is a smart switch device. MCCGQ01LM is a smart remote control. There are security holes in several Xiaomi products. An attacker could use this vulnerability to cause a denial of service
VAR-201912-1131 CVE-2019-19789 plural 3S-Smart CODESYS In product NULL Pointer dereference vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
3S-Smart CODESYS SP Realtime NT before V2.3.7.28, CODESYS Runtime Toolkit 32 bit full before V2.4.7.54, and CODESYS PLCWinNT before V2.4.7.54 allow a NULL pointer dereference
VAR-201912-1497 CVE-2019-15910 plural ASUS Input validation vulnerabilities in products CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An issue was discovered on ASUS HG100, MW100, WS-101, TS-101, AS-101, MS-101, DL-101 devices using ZigBee PRO. Attackers can utilize the "discover ZigBee network procedure" to perform a denial of service attack. plural ASUS The product contains an input validation vulnerability.Denial of service (DoS) May be in a state. ASUS SmartHome Gateway HG100 and other products are products of ASUS, Taiwan. ASUS SmartHome Gateway HG100 is a smart home central control gateway device. ASUS WS-101 is a smart switch sensor. TS-101 is a temperature / humidity sensor. There are security vulnerabilities in ASUS SmartHome Gateway HG100 version 1.05.12, WS-101 version 1.05.12, and TS-101 version 1.05.12 (using ZigBee PRO)
VAR-202001-0727 CVE-2019-18588 Dell EMC Unisphere for PowerMax and PowerMax OS Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Dell EMC Unisphere for PowerMax versions prior to 9.1.0.9, Dell EMC Unisphere for PowerMax versions prior to 9.0.2.16, and Dell EMC PowerMax OS 5978.221.221 and 5978.479.479 contain a Cross-Site Scripting (XSS) vulnerability. An authenticated malicious user may potentially exploit this vulnerability to inject javascript code and affect other authenticated users' sessions. Dell EMC Unisphere for PowerMax is a set of graphical management tools for PowerMax storage arrays developed by Dell. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-201912-0104 CVE-2019-6687 BIG-IP ASM Authentication vulnerability CVSS V2: 5.8
CVSS V3: 7.4
Severity: HIGH
On versions 15.0.0-15.0.1.1, the BIG-IP ASM Cloud Security Services profile uses a built-in verification mechanism that fails to properly authenticate the X.509 certificate of remote endpoints. BIG-IP ASM Contains an authentication vulnerability.Information may be obtained and information may be altered. F5 BIG-IP ASM is a Web Application Firewall (WAF) of F5 Corporation in the United States, which provides secure remote access, protects emails, simplifies Web access control, and enhances network and application performance. Attackers can exploit this vulnerability to intercept traffic sent to cloud services, read and modify transmitted data
VAR-201912-1017 CVE-2019-18236 WECON Technologies PLC Editor Buffer Overflow Vulnerability CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
Multiple buffer overflow vulnerabilities exist when the PLC Editor Version 1.3.5_20190129 processes project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. PLC Editor Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of WECON PLC Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of WCP files. A crafted PortPath element in a WCP file can trigger an overflow of a fixed-length buffer. WECON Technologies PLC Editor is a programming software for programmable logic controllers (PLCs) from China WECON Technologies
VAR-201912-2016 No CVE H3C ER5100 router has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Hangzhou H3C Communication Technology Co., Ltd. (abbreviated as H3C), mainly provides research, development, production, sales and service of IT infrastructure products and solutions. The H3C ER5100 router has a weak password vulnerability. Attackers can use the vulnerability to log in to the router backend.
VAR-201912-0998 CVE-2019-18263 plural Philips Vulnerability regarding encryption strength in products CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
An issue was found in Philips Veradius Unity, Pulsera, and Endura Dual WAN Router, Veradius Unity (718132) with wireless option (shipped between 2016-August 2018), Veradius Unity (718132) with ViewForum option (shipped between 2016-August 2018), Pulsera (718095) and Endura (718075) with wireless option (shipped between 26-June-2017 through 07-August 2018), Pulsera (718095) and Endura (718075) with ViewForum option (shipped between 26-June-2017 through 07-August 2018). The router software uses an encryption scheme that is not strong enough for the level of protection required. Philips Veradius Unity , Pulsera , Endura Dual WAN The router contains a cryptographic strength vulnerability.Denial of service (DoS) May be in a state. Philips Veradius Unity and others are European C-arm devices for the medical industry from Philips. The vulnerability stems from the use of a weak encryption mechanism in the program. Attackers can use this vulnerability to invade the management interface of the front-end router and affect the availability of data transmission
VAR-201912-2001 No CVE H3C ER6300G2 router has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Hangzhou Huasan Communication Technology Co., Ltd. (referred to as Huasan Communication), mainly provides research, development, production, sales and services of IT infrastructure products and solutions. Huasan ER6300G2 router has a weak password vulnerability. Attackers can use this vulnerability to log in to the router's backend.
VAR-201912-2012 No CVE H3C ER3260 router has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Hangzhou Huasan Communication Technology Co., Ltd. (referred to as Huasan Communication), mainly provides research, development, production, sales and services of IT infrastructure products and solutions. Huasan ER3260 router has a weak password vulnerability. Attackers can use this vulnerability to log in to the router's backend.