VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201912-0682 CVE-2019-18831 Barco ClickShare Button Information disclosure vulnerability in devices CVSS V2: 3.5
CVSS V3: 5.3
Severity: MEDIUM
Barco ClickShare Button R9861500D01 devices before 1.9.0 allow Information Exposure. The encrypted ClickShare Button firmware contains the private key of a test device-certificate. Attackers can use this vulnerability to disclose information
VAR-201912-0693 CVE-2019-18826 Barco ClickShare Button R9861500D01 Device validation vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Barco ClickShare Button R9861500D01 devices before 1.9.0 have Improper Following of a Certificate's Chain of Trust. The embedded 'dongle_bridge' program used to expose the functionalities of the ClickShare Button to a USB host, does not properly validate the whole certificate chain. Barco ClickShare Button R9861500D01 The device contains a certificate validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Attackers can use this vulnerability to authenticate and gain access to restricted commands
VAR-201912-0779 CVE-2019-5080 WAGO PFC 200 and PFC100 Vulnerability related to lack of certification for critical functions in firmware CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
An exploitable denial-of-service vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A single packet can cause a denial of service and weaken credentials resulting in the default documented credentials being applied to the device. An attacker can send an unauthenticated packet to trigger this vulnerability. WAGO PFC 200 and PFC100 Firmware is vulnerable to a lack of authentication for critical functions.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. WAGO PFC200 and WAGO PFC100 are both programmable logic controllers (PLCs) from the German company WAGO. Attackers can Exploitation of this vulnerability resulted in a denial of service
VAR-201912-0774 CVE-2019-5075 WAGO PFC200 Buffer Overflow Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An exploitable stack buffer overflow vulnerability exists in the command line utility getcouplerdetails of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets sent to the iocheckd service "I/O-Check" can cause a stack buffer overflow in the sub-process getcouplerdetails, resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. WAGO PFC200 is a programmable logic controller (PLC) from the German company WAGO. WAGO PFC200 has a buffer overflow vulnerability
VAR-201912-0679 CVE-2019-18828 Barco ClickShare Button Vulnerability related to information leak from cache in device CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
Barco ClickShare Button R9861500D01 devices before 1.9.0 have Insufficiently Protected Credentials. The root account (present for access via debug interfaces, which are by default not enabled on production devices) of the embedded Linux on the ClickShare Button is using a weak password. Barco ClickShare Button The device contains a vulnerability related to information disclosure from the cache.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The vulnerability originated from the program's insufficient protection of credentials, and an attacker could use this vulnerability to gain root user identity
VAR-201912-1420 CVE-2019-19743 D-Link DIR-615 Input Validation Error Vulnerability

Related entries in the VARIoT exploits database: VAR-E-201912-0028
CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
On D-Link DIR-615 devices, a normal user is able to create a root(admin) user from the D-Link portal. D-Link DIR-615 The device contains an input validation vulnerability.Information may be tampered with. D-Link DIR-615 is a wireless router from Taiwan D-Link. An attacker could use this vulnerability to create a root (admin) user
VAR-201912-0780 CVE-2019-5081 WAGO PFC 200 and PFC100 Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An exploitable heap buffer overflow vulnerability exists in the iocheckd service ''I/O-Chec'' functionality of WAGO PFC 200 Firmware version 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC200 is a programmable logic controller (PLC) from the German company WAGO. WAGO PFC200 has a buffer overflow vulnerability
VAR-201912-0773 CVE-2019-5074 WAGO PFC 200 and PFC100 Classic buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An exploitable stack buffer overflow vulnerability exists in the iocheckd service ''I/O-Check'' functionality of WAGO PFC200 Firmware version 03.01.07(13), WAGO PFC200 Firmware version 03.00.39(12) and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a stack buffer overflow, resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 The firmware contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. WAGO PFC 200 is a programmable logic controller (PLC) from the German company WAGO. A buffer overflow vulnerability exists in the I / O-Check function in WAGO PFC 200. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
VAR-202001-0422 CVE-2019-5082 WAGO PFC 200 and PFC100 Out-of-bounds write vulnerability in firmware CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An exploitable heap buffer overflow vulnerability exists in the iocheckd service I/O-Check functionality of WAGO PFC200 Firmware version 03.01.07(13), WAGO PFC200 Firmware version 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 Firmware contains an out-of-bounds write vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. WAGO PFC 200 and WAGO PFC100 are both programmable logic controllers (PLCs) from the German company WAGO. There is a buffer overflow vulnerability in the 'I / O-Check' function in WAGO PFC200 and PFC100. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations
VAR-201912-0776 CVE-2019-5077 WAGO PFC 200 and PFC100 Vulnerability related to lack of certification for critical functions in firmware CVSS V2: 8.5
CVSS V3: 9.1
Severity: CRITICAL
An exploitable denial-of-service vulnerability exists in the iocheckd service ‘’I/O-Chec’’ functionality of WAGO PFC 200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC 100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a denial of service, resulting in the device entering an error state where it ceases all network communications. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 Firmware is vulnerable to a lack of authentication for critical functions.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. WAGO PFC200 is a programmable logic controller (PLC) from the German company WAGO. WAGO PFC200 has an access control error vulnerability
VAR-201912-1836 CVE-2019-16779 RubyGem excon Input validation vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this. RubyGem excon Contains an input validation vulnerability.Information may be obtained. RubyGem excon is an HTTP server for Ruby applications. There are security vulnerabilities in RubyGem excon versions prior to 0.71.0. An attacker could use this vulnerability to leak information
VAR-201912-0678 CVE-2019-18827 Barco ClickShare Button R9861500D01 Vulnerability related to input validation on devices CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
On Barco ClickShare Button R9861500D01 devices (before firmware version 1.9.0) JTAG access is disabled after ROM code execution. This means that JTAG access is possible when the system is running code from ROM before handing control over to embedded firmware. Barco ClickShare Button R9861500D01 The device contains an input validation vulnerability.Information may be obtained
VAR-201912-0772 CVE-2019-5073 WAGO PFC200 Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
An exploitable information exposure vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause an external tool to fail, resulting in uninitialized stack data to be copied to the response packet buffer. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 Firmware contains an information disclosure vulnerability.Information may be obtained. WAGO PFC200 is a programmable logic controller (PLC) from the German company WAGO. WAGO PFC200 has an information disclosure vulnerability. The vulnerability stems from configuration errors during the operation of the network system or product. An attacker could use this vulnerability to obtain sensitive information about the affected components
VAR-201912-1255 CVE-2019-18579 Dell XPS 13 2-in-1 BIOS Configuration Error Vulnerability CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
Settings for the Dell XPS 13 2-in-1 (7390) BIOS versions prior to 1.1.3 contain a configuration vulnerability. The BIOS configuration for the "Enable Thunderbolt (and PCIe behind TBT) pre-boot modules" setting is enabled by default. A local unauthenticated attacker with physical access to a user's system can obtain read or write access to main memory via a DMA attack during platform boot. Dell XPS 13 2-in-1 (7390) BIOS Has unspecified vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Dell XPS 13 2-in-1 is a notebook computer from Dell, USA. BIOS is one of the basic input and output systems
VAR-201912-0778 CVE-2019-5079 WAGO PFC 200 and PFC100 Firmware out-of-bounds vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An exploitable heap buffer overflow vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 The firmware contains an out-of-bounds write vulnerability for a critical function.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. WAGO PFC200 is a programmable logic controller (PLC) from the German company WAGO. WAGO PFC200 has a buffer overflow vulnerability. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations
VAR-201912-0681 CVE-2019-18830 Barco ClickShare Button R9861500D01 Operating System Command Injection Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Barco ClickShare Button R9861500D01 devices before 1.9.0 allow OS Command Injection. The embedded 'dongle_bridge' program used to expose the functionalities of the ClickShare Button to a USB host, is vulnerable to OS command injection vulnerabilities. These vulnerabilities could lead to code execution on the ClickShare Button with the privileges of the user 'nobody'. Barco ClickShare Button The device includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Barco ClickShare Button R9861500D01 is a wireless control device for the demonstration system of Barco, Belgium. Barco ClickShare Button R9861500D01 The Dongle_bridge program embedded in versions earlier than 1.9.0 has an operating system command injection vulnerability, which originates from the process of externally inputting data to construct operating system executable commands, and the network system or product did not properly filter the special characters and commands. The attacker can use this vulnerability to execute illegal operating system commands
VAR-201912-0904 CVE-2019-19368 Rumpus FTP Web File Manager Cross-Site Scripting Vulnerability

Related entries in the VARIoT exploits database: VAR-E-201912-0079
CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
A Reflected Cross Site Scripting was discovered in the Login page of Rumpus FTP Web File Manager 8.2.9.1. An attacker can exploit it by sending a crafted link to end users and can execute arbitrary Javascripts. The vulnerability stems from the lack of proper validation of client data by web applications. An attacker could use this vulnerability to execute client code
VAR-201912-0876 CVE-2019-14605 Intel(R) SCS Platform Discovery Utility Inappropriate default permission vulnerability CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Improper permissions in the installer for the Intel(R) SCS Platform Discovery Utility, all versions, may allow an authenticated user to potentially enable escalation of privilege via local attack. Intel(R) SCS Platform Discovery Utility Contains a vulnerability with inappropriate default permissions.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel SCS Discovery Utility is a utility program of Intel Corporation for obtaining detailed data about Intel AMT. A security vulnerability exists in the installer in the Intel SCS Discovery Utility (all versions). A local attacker could exploit this vulnerability to elevate privileges
VAR-201912-1215 CVE-2019-16731 Petwant PF-103 Firmware and Petalk AI Vulnerabilities related to lack of authentication CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
The udpServerSys service in Petwant PF-103 firmware 4.22.2.42 and Petalk AI 3.2.2.30 allows remote attackers to initiate firmware upgrades and alter device settings. Petwant PF-103 Firmware and Petalk AI Is vulnerable to a lack of authentication.Information may be tampered with. Petwant PF-103 is an automatic pet feeding machine from China Petnant. Petalk AI is an automated pet feeder with monitoring capabilities
VAR-201912-1216 CVE-2019-16732 Petwant PF-103 Firmware and Petalk AI Vulnerability in digital signature verification CVSS V2: 9.3
CVSS V3: 8.1
Severity: HIGH
Unencrypted HTTP communications for firmware upgrades in Petalk AI and PF-103 allow man-in-the-middle attackers to run arbitrary code as the root user. Petwant PF-103 Firmware and Petalk AI Contains a vulnerability in the verification of digital signatures.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Petwant PF-103 is an automatic pet feeding machine from China Petnant. Petalk AI is an automated pet feeder with monitoring capabilities. A data forgery vulnerability exists in Petalk AI and PF-103. The vulnerability stems from the program using an unencrypted HTTP protocol for firmware updates