VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202504-3989 CVE-2025-26682 Microsoft's  ASP.NET Core  and  Microsoft Visual Studio  Service operation interruption in  (DoS)  Vulnerability CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network. Microsoft's ASP.NET Core and Microsoft Visual Studio includes denial of service (DoS) Vulnerability exists.Denial of service by unauthenticated attackers (DoS) It may be in a state
VAR-202504-1837 CVE-2024-48887 fortinet's  FortiSwitch  Unverified password change vulnerability in CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request. fortinet's FortiSwitch contains an unverified password change vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiSwitch is a network switch management tool from Fortinet, an American company. Fortinet FortiSwitch has an authorization issue vulnerability, which stems from unauthenticated password changes. Attackers can exploit this vulnerability to cause the administrator password to be tampered with
VAR-202504-1464 CVE-2025-3289 Rockwell Automation  of  Arena  Out-of-bounds write vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. Rockwell Automation of Arena Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation Arena is discrete-event simulation and automation software from Rockwell Automation
VAR-202504-2295 CVE-2025-3288 Rockwell Automation  of  Arena  Out-of-bounds read vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. Rockwell Automation of Arena Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation Arena is discrete-event simulation and automation software from Rockwell Automation
VAR-202504-3071 CVE-2025-3287 Rockwell Automation  of  Arena  Out-of-bounds read vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. Rockwell Automation of Arena Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation Arena is discrete-event simulation and automation software from Rockwell Automation
VAR-202504-1882 CVE-2025-3286 Rockwell Automation  of  Arena  Out-of-bounds read vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. Rockwell Automation of Arena Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation Arena is discrete-event simulation and automation software from Rockwell Automation
VAR-202504-1549 CVE-2025-2829 Rockwell Automation  of  Arena  Out-of-bounds write vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. Rockwell Automation of Arena Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation Arena is discrete-event simulation and automation software from Rockwell Automation
VAR-202504-3927 CVE-2025-2293 Rockwell Automation  of  Arena  Out-of-bounds write vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. Rockwell Automation of Arena Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation Arena is discrete-event simulation and automation software from Rockwell Automation
VAR-202504-2788 CVE-2025-2288 Rockwell Automation  of  Arena  Out-of-bounds write vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. Rockwell Automation of Arena Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation Arena is discrete-event simulation and automation software from Rockwell Automation
VAR-202504-2014 CVE-2025-2287 Rockwell Automation  of  Arena  Vulnerability in accessing uninitialized pointers in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. (DoS) It may be in a state. Rockwell Automation Arena is discrete-event simulation and automation software from Rockwell Automation
VAR-202504-2416 CVE-2025-2286 Rockwell Automation  of  Arena  Vulnerability in accessing uninitialized pointers in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. (DoS) It may be in a state. Rockwell Automation Arena is discrete-event simulation and automation software from Rockwell Automation
VAR-202504-2997 CVE-2025-2285 Rockwell Automation  of  Arena  Vulnerability in accessing uninitialized pointers in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. (DoS) It may be in a state. Rockwell Automation Arena is discrete-event simulation and automation software from Rockwell Automation
VAR-202504-3035 CVE-2024-50565 Multiple Fortinet products vulnerable to man-in-the-middle issues CVSS V2: -
CVSS V3: 3.1
Severity: LOW
A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15 and 6.2.0 through 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15 and 2.0.0 through 2.0.14, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2, 6.4.0 through 6.4.8 and 6.0.0 through 6.0.12 and Fortinet FortiWeb version 7.4.0 through 7.4.2, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10 allows an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device. Fortiweb , FortiVoice , FortiProxy Several Fortinet products, including the above, are vulnerable to man-in-the-middle issues.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202504-4202 CVE-2024-26013 CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15 and before 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9 and before 7.0.15, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and before 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and before 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2 before 6.4.8 and Fortinet FortiWeb before 7.4.2 may allow an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device
VAR-202504-0715 CVE-2025-29999 Siemens License Server Improper Permission Management Vulnerability CVSS V2: 6.0
CVSS V3: 6.7
Severity: Medium
A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affected application searches for executable files in the application folder without proper validation. This could allow an attacker to execute arbitrary code with administrative privileges by placing a malicious executable in the same directory
VAR-202504-0719 CVE-2024-41796 Siemens'  SENTRON 7KT PAC1260 Data Manager  Unverified password change vulnerability in firmware CVSS V2: 7.8
CVSS V3: 6.5
Severity: Medium
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices allows to change the login password without knowing the current password. In combination with a prepared CSRF attack (CVE-2024-41795) an unauthenticated attacker could be able to set the password to an attacker-controlled value. Siemens' SENTRON 7KT PAC1260 Data Manager The firmware contains an unverified password change vulnerability.Information may be tampered with. Siemens SENTRON 7KT PAC1260 Data Manager is a device for power monitoring and energy consumption management from Siemens, Germany
VAR-202504-0725 CVE-2024-41795 Siemens'  SENTRON 7KT PAC1260 Data Manager  Cross-site request forgery vulnerability in firmware CVSS V2: 7.8
CVSS V3: 6.5
Severity: Medium
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices is vulnerable to Cross-Site Request Forgery (CSRF) attacks. This could allow an unauthenticated attacker to change arbitrary device settings by tricking a legitimate device administrator to click on a malicious link. Siemens SENTRON 7KT PAC1260 Data Manager is a device for power monitoring and energy consumption management from Siemens, Germany. Siemens SENTRON 7KT PAC1260 Data Manager has a security vulnerability that stems from the web interface of the affected device allowing the login password to be changed without knowing the current password. Combined with a prepared CSRF attack (CVE-2024-441795), an unauthenticated attacker can exploit this vulnerability to set the password to a value controlled by the attacker
VAR-202504-0723 CVE-2024-41794 Siemens'  SENTRON 7KT PAC1260 Data Manager  Vulnerability related to use of hardcoded credentials in firmware CVSS V2: 10.0
CVSS V3: 10.0
Severity: Critical
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793). Siemens' SENTRON 7KT PAC1260 Data Manager A vulnerability exists in the firmware regarding the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany. The vulnerability is caused by the existence of hard-coded credentials
VAR-202504-0721 CVE-2024-41793 Siemens'  SENTRON 7KT PAC1260 Data Manager  Vulnerability related to lack of authentication for critical functions in firmware CVSS V2: 7.8
CVSS V3: 8.6
Severity: High
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices provides an endpoint that allows to enable the ssh service without authentication. This could allow an unauthenticated remote attacker to enable remote access to the device via ssh. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany
VAR-202504-0722 CVE-2024-41792 Siemens'  SENTRON 7KT PAC1260 Data Manager  Path traversal vulnerability in firmware CVSS V2: 7.8
CVSS V3: 8.6
Severity: Critical
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices contains a path traversal vulnerability. This could allow an unauthenticated attacker it to access arbitrary files on the device with root privileges. Siemens SENTRON 7KT PAC1260 Data Manager is a device used for power monitoring and energy consumption management by Siemens, Germany