VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202004-2244 No CVE D-Link DIR-615 privilege elevation vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
D-Link DIR-615 is a wireless router from D-Link, Taiwan. D-Link DIR-615 has a privilege escalation vulnerability. The vulnerability stems from the program's failure to complete verification and error detection of the file path. Attackers can use the REST API to upload malicious software to exploit this vulnerability to elevate permissions.
VAR-202004-2224 No CVE Beijing Hollysys Automation Drive Technology Co., Ltd. and HollySys HT8000 have a memory corruption vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Founded in 1993, Hollysys is a leading supplier of automation and information technology solutions in China. HT8000CN configuration software is the company's HT series touch screen configuration screen development system. Beijing HollySys Automation Drive Technology Co., Ltd. and HollySys HT8000 have a memory corruption vulnerability that an attacker can use to construct a malformed shm file that can cause the program to crash.
VAR-202004-2223 No CVE Beijing HollySys Automation Drive Technology Co., Ltd. and HollySys HT8001 have a memory corruption vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Beijing Hershey Automation Drive Technology Co., Ltd. is China's leading provider of automation and information technology solutions. HT8001CN configuration software is the company's HT series touch screen configuration screen development system. It is an integrated development environment. It is very rich and very Powerful development function. Beijing Hollysys Automation Drive Technology Co., Ltd. and HollySys HT8001 have a memory corruption vulnerability, which can be exploited by an attacker to construct a malformed shm file that can cause the program to crash.
VAR-202004-1879 CVE-2020-5330 plural Dell EMC Information leakage vulnerabilities in products CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Dell EMC Networking X-Series firmware versions 3.0.1.2 and older, Dell EMC Networking PC5500 firmware versions 4.1.0.22 and older and Dell EMC PowerEdge VRTX Switch Modules firmware versions 2.0.0.77 and older contain an information disclosure vulnerability. A remote unauthenticated attacker could exploit this vulnerability to retrieve sensitive data by sending a specially crafted request to the affected endpoints. Dell EMC Networking X-Series, etc. are products of the American Dell (Dell) company
VAR-202004-1257 CVE-2015-8546 Samsung Out-of-bounds write vulnerabilities on mobile devices CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on Samsung mobile devices with software through 2015-11-12, affecting the Galaxy S6/S6 Edge, Galaxy S6 Edge+, and Galaxy Note5 with the Shannon333 chipset. There is a stack-based buffer overflow in the baseband process that is exploitable for remote code execution via a fake base station. The Samsung ID is SVE-2015-5123 (December 2015). Samsung An out-of-bounds write vulnerability exists in mobile devices. This vulnerability is Samsung ID: SVE-2015-5123 It is published as.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Samsung Galaxy S6, etc. are all smartphones of South Korea's Samsung company
VAR-202004-2039 CVE-2020-6765 D-Link DSL-GS225 J1 operating system command injection vulnerability CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
D-Link DSL-GS225 J1 AU_1.0.4 devices allow an admin to execute OS commands by placing shell metacharacters after a supported CLI command, as demonstrated by ping -c1 127.0.0.1; cat/etc/passwd. The CLI is reachable by TELNET. D-Link DSL-GS225 J1 On the device OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. D-Link DSL-GS225 J1 is a wireless router from D-Link, Taiwan. There is a security vulnerability in D-Link DSL-GS225 J1 AU_1.0.4 version
VAR-202004-2333 No CVE Fuji Electric V-Server Lite VPR File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric V-Server Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of VPR files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
VAR-202004-2332 No CVE Fuji Electric V-Server Lite VPR File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric V-Server Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of VPR files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
VAR-202004-2241 No CVE Nanjing Yunen Communication Technology Co., Ltd.'s handheld housekeeping camera has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Nanjing Yunen Communication Technology Co., Ltd.'s handheld housekeeping users have reached 28 million by March 2018, and 3 million smart devices integrated with the Yunen SDK have been installed in more than 100 cooperative enterprises. Nanjing Yunen Communication Technology Co., Ltd.'s handheld housekeeping camera has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202004-0058 CVE-2020-10642 Rockwell Automation Made RSLinx Classic Vulnerability in improper permission assignment for critical resources in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
In Rockwell Automation RSLinx Classic versions 4.11.00 and prior, an authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic. Rockwell Automation Provided by the company RSLinx Classic Is software for managing industrial equipment. RSLinx Classic Inappropriate permission assignment for critical resources (CWE-732) Vulnerability exists. The program supports access to RockwellSoftware and Allen-Bradley applications through Allen-Bradley programmable controllers. A local attacker could exploit this vulnerability to execute malicious code with system privileges
VAR-202004-1823 CVE-2020-9499 Dahua Classic buffer overflow vulnerability in the product CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
Some Dahua products have buffer overflow vulnerabilities. After the successful login of the legal account, the attacker sends a specific DDNS test command, which may cause the device to go down. Dahua The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Dahua SD6AL Series and others are products of China Dahua Company. SD6AL Series is a SD6AL series network camera. NVR 5x Series is a 5x series network video recorder. IPC-HX2XXX Series is an IPC-HX2XXX series network camera
VAR-202004-1824 CVE-2020-9500 Dahua Input verification vulnerability in CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
Some products of Dahua have Denial of Service vulnerabilities. After the successful login of the legal account, the attacker sends a specific log query command, which may cause the device to go down. Dahua There is an input verification vulnerability in.Service operation interruption (DoS) It may be put into a state. Dahua SD6AL Series and others are products of China Dahua Company. SD6AL Series is a SD6AL series network camera. NVR 5x Series is a 5x series network video recorder. IPC-HX2XXX Series is an IPC-HX2XXX series network camera. There are security holes in many Dahua products
VAR-202004-0834 CVE-2019-18375 ASG and ProxySG management console Vulnerability in CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
The ASG and ProxySG management consoles are susceptible to a session hijacking vulnerability. A remote attacker, with access to the appliance management interface, can hijack the session of a currently logged-in user and access the management console. Broadcom Advanced Secure Gateway and ProxySG are both secure Web gateway devices from Broadcom Corporation
VAR-202004-2178 CVE-2020-1632 Juniper Networks Junos OS and Junos OS Evolved Vulnerability in handling exceptional conditions on devices CVSS V2: 7.8
CVSS V3: 8.6
Severity: HIGH
In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos OS and Junos OS Evolved devices to advertise an invalid BGP UPDATE message to other peers, causing the other peers to terminate the established BGP session, creating a Denial of Service (DoS) condition. For example, Router A sends a specific BGP UPDATE to Router B, causing Router B to send an invalid BGP UPDATE message to Router C, resulting in termination of the BGP session between Router B and Router C. This issue might occur when there is at least a single BGP session established on the device that does not support 4 Byte AS extension (RFC 4893). Repeated receipt of the same BGP UPDATE can result in an extended DoS condition. This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S6; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R2-S11, 17.1R3-S2; 17.2 versions prior to 17.2R1-S9, 17.2R2-S8, 17.2R3-S3; 17.2X75 versions prior to 17.2X75-D105, 17.2X75-D110, 17.2X75-D44; 17.3 versions prior to 17.3R2-S5, 17.3R3-S7; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R2-S6, 18.2R3-S2; 18.2X75 versions prior to 18.2X75-D12, 18.2X75-D33, 18.2X75-D411, 18.2X75-D420, 18.2X75-D51, 18.2X75-D60; 18.3 versions prior to 18.3R1-S6, 18.3R2-S3, 18.3R3; 18.4 versions prior to 18.4R1-S5, 18.4R3; 18.4 version 18.4R2 and later versions; 19.1 versions prior to 19.1R1-S3, 19.1R2; 19.2 versions prior to 19.2R1-S2, 19.2R2. This issue does not affect Juniper Networks Junos OS prior to 16.1R1. This issue affects Juniper Networks Junos OS Evolved prior to 19.2R2-EVO. The operating system provides a secure programming interface and Junos SDK. Junos OS Evolved is an upgraded version of Junos OS
VAR-202004-2197 CVE-2020-1633 Juniper Networks Junos OS Input verification vulnerability in CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, leading to a Denial of Service (DoS) condition. This issue only affects Junos OS 17.4 and later releases. Prior releases do not support this feature and are unaffected by this vulnerability. This issue only affects IPv6. IPv4 ARP proxy is unaffected by this vulnerability. This issue affects Juniper Networks Junos OS: 17.4 versions prior to 17.4R2-S9, 17.4R3 on MX Series; 18.1 versions prior to 18.1R3-S9 on MX Series; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3 on MX Series; 18.2X75 versions prior to 18.2X75-D33, 18.2X75-D411, 18.2X75-D420, 18.2X75-D60 on MX Series; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3 on MX Series; 18.4 versions prior to 18.4R1-S5, 18.4R2-S2, 18.4R3 on MX Series; 19.1 versions prior to 19.1R1-S4, 19.1R2 on MX Series; 19.2 versions prior to 19.2R1-S3, 19.2R2 on MX Series. Juniper Networks Junos OS There is an input verification vulnerability in.Service operation interruption (DoS) It may be put into a state
VAR-202005-0336 CVE-2020-12010 Advantech WebAccess Node Path traversal vulnerability CVSS V2: 5.8
CVSS V3: 8.2
Severity: HIGH
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow an authenticated user to use a specially crafted file to delete files outside the application’s control. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to delete arbitrary files on affected installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x2715 in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. Advantech WebAccess Node has a path traversal vulnerability, which can be exploited by an attacker to inject and execute specially crafted input into memory. Advantech WebAccess is a set of browser-based HMI/SCADA software developed by China Taiwan Advantech Company. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. Path traversal vulnerabilities exist in Advantech WebAccess Node 8.4.4 and earlier versions and 9.0.0 versions
VAR-202004-0077 CVE-2020-10617 Advantech WebAccess/NMS DBUtil SQL Injection Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
There are multiple ways an unauthenticated attacker could perform SQL injection on WebAccess/NMS (versions prior to 3.0.2) to gain access to sensitive information. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/NMS. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of calls to the getSeverByAlarm method of the DBUtil class. When parsing the events parameter of the emsEvents endpoint, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose files in the context of SYSTEM
VAR-202004-2331 No CVE Advantech WebAccess/NMS AccesslogAction SQL Injection Information Disclosure Vulnerability CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/NMS. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of calls to the AccesslogAction.action endpoint. When parsing the user parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
VAR-202004-2231 CVE-2019-4532 Unknown vulnerability in IBM Resilient CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
IBM Resilient is a set of incident response platform of IBM in the United States. The platform supports such functions as incident response process orchestration and incident management. There are security vulnerabilities in IBM Resilient version 33.x and version 34.0. The vulnerability stems from the program's failure to properly limit the number or frequency of interactions with users. No detailed vulnerability details are currently available.
VAR-202004-0956 CVE-2020-1802 plural Huawei Vulnerability in product integrity verification deficiencies CVSS V2: 2.1
CVSS V3: 4.6
Severity: MEDIUM
There is an insufficient integrity validation vulnerability in several products. The device does not sufficiently validate the integrity of certain file in certain loading processes, successful exploit could allow the attacker to load a crafted file to the device through USB.Affected product versions include:OSCA-550 versions 1.0.1.23(SP2);OSCA-550A versions 1.0.1.23(SP2);OSCA-550AX versions 1.0.1.23(SP2);OSCA-550X versions 1.0.1.23(SP2). plural Huawei The product contains a vulnerability related to data integrity verification deficiencies.Information may be tampered with. Huawei OSCA-550 and others are all smart screen devices from China's Huawei company. An attacker could use the vulnerability to cause the device to load a fake file that it uploaded via USB