VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201912-0829 CVE-2019-7482 SonicWall SMA100 Vulnerable to out-of-bounds writing CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Stack-based buffer overflow in SonicWall SMA100 allows an unauthenticated user to execute arbitrary code in function libSys.so. This vulnerability impacted SMA100 version 9.0.0.3 and earlier. SonicWall SMA100 Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SonicWall SMA100 is a secure access gateway device from SonicWall, USA. SonicWall SMA100 has a buffer overflow vulnerability. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
VAR-201912-0833 CVE-2019-7486 SonicWall SMA100 Code Injection Vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
Code injection in SonicWall SMA100 allows an authenticated user to execute arbitrary code in viewcacert CGI script. This vulnerability impacted SMA100 version 9.0.0.4 and earlier. SonicWall SMA100 Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SonicWall SMA100 is a secure access gateway device from SonicWall, USA. The vulnerability originates from the process of constructing code segments by external input data, and the network system or product does not properly filter the special elements therein. Attackers can use this vulnerability to generate illegal code segments and modify the expected execution control flow of network systems or components
VAR-201912-1419 CVE-2019-19742 D-Link DIR-615 Device cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
On D-Link DIR-615 devices, the User Account Configuration page is vulnerable to blind XSS via the name field. D-Link DIR-615 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-Link DIR-615 is a wireless router from Taiwan D-Link Corporation. The vulnerability stems from the lack of proper validation of client data by web applications. An attacker could use this vulnerability to execute client code
VAR-201912-1252 CVE-2019-18573 RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance Session fixation vulnerability in products CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a Session Fixation vulnerability. An authenticated malicious local user could potentially exploit this vulnerability as the session token is exposed as part of the URL. A remote attacker can gain access to victim’s session and perform arbitrary actions with privileges of the user within the compromised session
VAR-201912-1251 CVE-2019-18572 RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance Authentication vulnerabilities in products CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain an Improper Authentication vulnerability. A Java JMX agent running on the remote host is configured with plain text password authentication. An unauthenticated remote attacker can connect to the JMX agent and monitor and manage the Java application
VAR-201912-1250 CVE-2019-18571 RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance Product cross-site scripting vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a reflected cross-site scripting vulnerability in the My Access Live module [MAL]. An authenticated malicious local user could potentially exploit this vulnerability by sending crafted URL with scripts. When victim users access the module through their browsers, the malicious code gets injected and executed by the web browser in the context of the vulnerable web application. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-201912-0834 CVE-2019-7487 SonicOS SSLVPN NACagent Vulnerable to unquoted search paths or elements CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Installation of the SonicOS SSLVPN NACagent 3.5 on the Windows operating system, an autorun value is created does not put the path in quotes, so if a malicious binary by an attacker within the parent path could allow code execution. SonicOS SSLVPN NACagent Contains an unquoted search path or element vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. SonicWall SonicOS SSLVPN NACagent is a VPN (Virtual Private Network) client application developed by SonicWall in the United States. A code issue vulnerability exists in SonicOS SSLVPN NACagent version 3.5 (Windows). An attacker could exploit this vulnerability to execute code through malicious binaries
VAR-201912-0107 CVE-2019-8791 Shazam Android and Shazam iOS In the application URL Scheme analysis vulnerability CVSS V2: 5.8
CVSS V3: 6.1
Severity: MEDIUM
An issue existed in the parsing of URL schemes. This issue was addressed with improved URL validation. This issue is fixed in Shazam Android App Version 9.25.0, Shazam iOS App Version 12.11.0. Processing a maliciously crafted URL may lead to an open redirect. Shazam is a music playback application. The program has functions such as music recognition and playback
VAR-201912-0106 CVE-2019-8849 TSwiftNIO SSL Vulnerable to arbitrary code execution CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
The issue was addressed by signaling that an executable stack is not required. This issue is fixed in SwiftNIO SSL 2.4.1. A SwiftNIO application using TLS may be able to execute arbitrary code. A security vulnerability exists in SwiftNIO SSL
VAR-201912-1791 CVE-2019-10614 plural Snapdragon Vulnerability related to out-of-bounds writing in products CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Out of boundary access is possible as there is no validation of data accessed against the received size of the packet in case of malicious firmware in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCN7605, QCS405, QCS605, QM215, SA6155P, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130. plural Snapdragon The product contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
VAR-201912-1723 CVE-2019-10572 plural Snapdragon Product integer overflow vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Improper check in video driver while processing data from video firmware can lead to integer overflow and then buffer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCS405, QCS605, QM215, SA6155P, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130. plural Snapdragon The product contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
VAR-201912-1122 CVE-2019-19832 Xerox AltaLink C8035 Printer vulnerable to cross-site request forgery CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
Xerox AltaLink C8035 printers allow CSRF. A request to add users is made in the Device User Database form field to the xerox.set URI. (The frmUserName value must have a unique name.). Xerox AltaLink C8035 Printer contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. A cross-site request forgery vulnerability exists in Xerox AltaLink C8035. The vulnerability stems from the fact that the WEB application did not fully verify whether the request came from a trusted user. An attacker could use this vulnerability to send unexpected requests to the server through the affected client
VAR-201912-0683 CVE-2019-18832 Barco ClickShare Button R9861500D01 Vulnerability related to information leak from cache in device CVSS V2: 6.8
CVSS V3: 8.1
Severity: HIGH
Barco ClickShare Button R9861500D01 devices before 1.9.0 have incorrect Credentials Management. The ClickShare Button implements encryption at rest which uses a one-time programmable (OTP) AES encryption key. This key is shared across all ClickShare Buttons of model R9861500D01. Barco ClickShare Button R9861500D01 The device contains a vulnerability related to information disclosure from the cache.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Attackers could use this vulnerability to forge arbitrary software images
VAR-201912-0684 CVE-2019-18833 Barco ClickShare Button R9861500D01 Vulnerability related to lack of encryption of critical data on devices CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
Barco ClickShare Button R9861500D01 devices before 1.9.0 allow Information exposure (issue 2 of 2).. The encryption key of the media content which is shared between a ClickShare Button and a ClickShare Base Unit is randomly generated for each new session and communicated over a TLS connection. An attacker who is able to perform a Man-in-the-Middle attack between the TLS connection, is able to obtain the encryption key. Barco ClickShare Button R9861500D01 The device contains a vulnerability related to the lack of encryption of critical data.Information may be obtained. Barco ClickShare Button R9861500D01 is a wireless control device for the demonstration system of Barco, Belgium
VAR-201912-0691 CVE-2019-18824 Barco ClickShare Button R9861500D01 Vulnerability related to input validation on devices CVSS V2: 6.9
CVSS V3: 6.6
Severity: MEDIUM
Barco ClickShare Button R9861500D01 devices before 1.10.0.13 have Missing Support for Integrity Check. The ClickShare Button does not verify the integrity of the mutable content on the UBIFS partition before being used. Barco ClickShare Button R9861500D01 The device contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An attacker can use this vulnerability to open a backdoor to the device and present specially crafted data to the user
VAR-201912-0999 CVE-2019-18267 GE S2020 and S2020G Fast Switch 61850 Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
An issue was found in GE S2020/S2020G Fast Switch 61850, S2020/S2020G Fast Switch 61850 Versions 07A03 and prior. An attacker can inject arbitrary Javascript in a specially crafted HTTP request that may be reflected back in the HTTP response. The device is also vulnerable to a stored cross-site scripting vulnerability that may allow session hijacking, disclosure of sensitive data, cross-site request forgery (CSRF) attacks, and remote code execution. GE S2020 and S2020G Fast Switch 61850 Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. An attacker could use this vulnerability to inject arbitrary code
VAR-201912-0680 CVE-2019-18829 Barco ClickShare Button R9861500D01 Unreliable search path vulnerability in device CVSS V2: 4.4
CVSS V3: 7.8
Severity: HIGH
Barco ClickShare Button R9861500D01 devices before 1.10.0.13 have Missing Support for Integrity Check. The Barco signed 'Clickshare_For_Windows.exe' binary on the ClickShare Button (R9861500D01) loads a number of DLL files dynamically without verifying their integrity. Barco ClickShare Button R9861500D01 The device contains an untrusted search path vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Attackers can use this vulnerability to inject arbitrary code
VAR-201912-0828 CVE-2019-7481 SonicWall SMA100 Vulnerable to information disclosure CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Vulnerability in SonicWall SMA100 allow unauthenticated user to gain read-only access to unauthorized resources. This vulnerablity impacted SMA100 version 9.0.0.3 and earlier. SonicWall SMA100 Contains an information disclosure vulnerability.Information may be obtained. SonicWall SMA100 is a secure access gateway device from SonicWall, USA
VAR-201912-1997 CVE-2019-7405 TP-Link Archer Router Unauthenticated Access Vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
TP-Link Archer is a wireless router of China TP-Link company. The TP-Link Archer router has an unauthenticated access vulnerability. An attacker can use this vulnerability to reset the administrator password by constructing a malicious attack script.
VAR-201912-0777 CVE-2019-5078 WAGO PFC200 Access Control Error Vulnerability CVSS V2: 9.4
CVSS V3: 9.1
Severity: CRITICAL
An exploitable denial of service vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a denial of service, resulting in the device entering an error state where it ceases all network communications. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 Firmware is vulnerable to a lack of authentication for critical functions.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. WAGO PFC200 is a programmable logic controller (PLC) from the German company WAGO. WAGO PFC200 has an access control error vulnerability