VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201910-1743 No CVE Siemens SIMATIC WinCC CCRedCodiAlarm Control has null pointer vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Siemens SIMATIC is an automation software with a single engineering environment. WinCC supports the discovery and configuration of LAN device information using the PN-DCP protocol at the Ethernet layer. There is a null pointer vulnerability in the Siemens SIMATIC WinCC CCRedCodiAlarm control. An attacker could exploit the vulnerability to cause a denial of service
VAR-201910-1748 No CVE Stack overflow vulnerability in Siemens SIMATIC WinCC CcApEditAction.dll control CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Siemens SIMATIC is an automation software with a single engineering environment. WinCC supports the discovery and configuration of LAN device information using the PN-DCP protocol at the Ethernet layer. A stack overflow vulnerability exists in the Siemens SIMATIC WinCC CcApEditAction.dll control. An attacker executes arbitrary code by constructing an input string, causing a stack overflow
VAR-201910-1738 No CVE Integer overflow vulnerability in S7hcom_x.dll control of Siemens SIMATIC STEP 7 CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Siemens SIMATIC STEP 7 (TIA Portal) is a set of programming software for SIMATIC controllers from Siemens (Germany). The software provides PLC programming, design option packages and advanced driver technology. An integer overflow vulnerability exists in the S7hcom_x.dll control of Siemens SIMATIC STEP 7. An attacker could exploit the vulnerability to cause an integer overflow
VAR-201910-1741 No CVE Arbitrary file writing vulnerability in Siemens SIMATIC WinCC PdlComponents.dll control CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Siemens SIMATIC is an automation software with a single engineering environment. WinCC supports the discovery and configuration of LAN device information using the PN-DCP protocol at the Ethernet layer. An arbitrary file writing vulnerability exists in the Siemens SIMATIC WinCC PdlComponents.dll control. An attacker can call this function to write to any file on the computer, including generating a malicious program
VAR-201910-1860 No CVE Arbitrary password reset vulnerability in the front desk of the laboratory management system of Hunan Santang Information Technology Co., Ltd. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Hunan Santang Information Technology Co., Ltd. takes the IT operation and maintenance integration platform and IT operation and maintenance service sharing platform as the core, and the business system supplemented by the university's smart laboratory and IT customization development to create an "Internet of Things" type IT integrated operation and maintenance platform , Help users to visualize unified operation and maintenance management of IT assets. An arbitrary password reset vulnerability exists in the front desk of the laboratory management system of Hunan Santang Information Technology Co., Ltd. An attacker can use the vulnerability to reset the administrator account password.
VAR-201910-1857 No CVE SQL injection vulnerability exists in the front desk of the laboratory management system of Hunan Santang Information Technology Co., Ltd. CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Hunan Santang Information Technology Co., Ltd. takes the IT operation and maintenance integration platform and IT operation and maintenance service sharing platform as the core, and the business system supplemented by the university's smart laboratory and IT customization development to create an "Internet of Things" type IT integrated operation and maintenance platform , Help users to visualize unified operation and maintenance management of IT assets. There is a SQL injection vulnerability in the front of the laboratory management system of Hunan Santang Information Technology Co., Ltd. An attacker can use the vulnerability to obtain database information.
VAR-201910-0880 CVE-2019-18203 RICOH MP 501 Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
On the RICOH MP 501 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn and KeyDisplay parameter to /web/entry/en/address/adrsSetUserWizard.cgi. RICOH MP 501 The printer contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. The RICOH MP 501 is a printer from the Japanese company RICOH. The vulnerability stems from the lack of proper verification of client data by web applications. Attackers can use this vulnerability to execute client code
VAR-202001-0772 CVE-2019-15712 FortiMail admin  Vulnerabilities related to lack of authentication CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
An improper access control vulnerability in FortiMail admin webUI 6.2.0, 6.0.0 to 6.0.6, 5.4.10 and below may allow administrators to access web console they should not be authorized for. FortiMail admin Vulnerable to a lack of authentication.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Fortinet FortiMail is a suite of e-mail security gateway products from Fortinet. The product provides features such as email security and data protection. Fortinet FortiMail version 6.2.0, versions 6.0.0 to 6.0.6, and versions 5.4.10 and earlier have security vulnerabilities
VAR-202001-0771 CVE-2019-15707 FortiMail admin  Vulnerable to unauthorized authentication CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
An improper access control vulnerability in FortiMail admin webUI 6.2.0, 6.0.0 to 6.0.6, 5.4.10 and below may allow administrators to perform system backup config download they should not be authorized for. FortiMail admin Contains an incorrect authentication vulnerability.Information may be obtained. Fortinet FortiMail is a suite of e-mail security gateway products from Fortinet. The product provides features such as email security and data protection. Fortinet FortiMail version 6.2.0, versions 6.0.0 to 6.0.6, and versions 5.4.10 and earlier have security vulnerabilities. Attackers can exploit this vulnerability to download system backup configuration files
VAR-201910-1237 CVE-2019-15703 Fortinet FortiOS Vulnerabilities related to lack of entropy CVSS V2: 2.6
CVSS V3: 7.5
Severity: HIGH
An Insufficient Entropy in PRNG vulnerability in Fortinet FortiOS 6.2.1, 6.2.0, 6.0.8 and below for device not enable hardware TRNG token and models not support builtin TRNG seed allows attacker to theoretically recover the long term ECDSA secret in a TLS client with a RSA handshake and mutual ECDSA authentication via the help of flush+reload side channel attacks in FortiGate VM models only. Fortinet FortiOS Contains a vulnerability related to lack of entropy.Information may be obtained. Fortinet FortiOS is a set of security operating system dedicated to the FortiGate network security platform developed by Fortinet. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSLVPN, Web content filtering and anti-spam. Fortinet FortiOS versions 6.2.1, 6.2.0, 6.0.8 and earlier have security signature vulnerabilities in the deterministic (pseudo-random) number generator (PRNG). An attacker could exploit this vulnerability to obtain sensitive information
VAR-201910-0889 CVE-2019-18216 ASUS ROG Zephyrus M GM501GS Laptop input validation vulnerability CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
The BIOS configuration design on ASUS ROG Zephyrus M GM501GS laptops with BIOS 313 relies on the main battery instead of using a CMOS battery, which reduces the value of a protection mechanism in which booting from a USB device is prohibited. Attackers who have physical laptop access can exhaust the main battery to reset the BIOS configuration, and then achieve direct access to the hard drive by booting a live USB OS without disassembling the laptop. NOTE: the vendor has apparently indicated that this is "normal" and use of the same battery for the BIOS and the overall system is a "new design." However, the vendor apparently plans to "improve" this an unspecified later time. ** Unsettled ** This case has not been confirmed as a vulnerability. ASUS ROG Zephyrus M GM501GS Laptops are vulnerable to input validation. The vendor has disputed this vulnerability. For details, see NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2019-18216Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
VAR-201910-1862 No CVE Triconex SIS system has authentication bypass vulnerability CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
The Triconex SIS system is a modern programmable logic and process controller. The Triconex SIS system has an authentication bypass vulnerability that can be used by unauthorized attackers to access the controller.
VAR-201910-1858 No CVE Ruijie NBR router has weak password vulnerability CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
Ruijie Networks Co., Ltd. is a company mainly engaged in information system integration services; Internet virtual private network services; Internet management services and other projects. A weak password vulnerability exists in Ruijie NBR routers. Attackers can use this vulnerability to obtain sensitive information.
VAR-201910-0872 CVE-2019-18202 WAGO Series PFC100 and PFC200 Vulnerability related to externally controllable references to other domain resources on devices CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests. WAGO Series PFC100 and PFC200 The device is vulnerable to an externally controllable reference to another realm resource.Information may be obtained. WAGO Series PFC100 and WAGO Series PFC200 are both programmable logic controllers from German WAGO company
VAR-201910-1677 CVE-2019-12148 Sangoma Session Border Controller Authentication vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to an authentication bypass via an argument injection vulnerability involving special characters in the username field. Upon successful exploitation, a remote unauthenticated user can login into the device's admin web portal without providing any credentials. This affects /var/webconfig/gui/Webconfig.inc.php. Sangoma Technologies SBC is a Border Session Controller (SBC) from Sangoma Technologies of Canada. Sangoma Technologies SBC 2.3.23-119-GA version has a parameter injection vulnerability. An attacker can use this vulnerability to bypass authentication and log in as a non-existent user, and obtain full access to the database, including the creation of authorized users
VAR-201910-0706 CVE-2019-17526 SageMath Sage Cell Server operating system command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered in SageMath Sage Cell Server through 2019-10-05. Python Code Injection can occur in the context of an internet facing web application. Malicious actors can execute arbitrary commands on the underlying operating system, as demonstrated by an __import__('os').popen('whoami').read() line. NOTE: the vendor's position is that the product is "vulnerable by design" and the current behavior will be retained. ** Unsettled ** This case has not been confirmed as a vulnerability. The vendor has disputed this vulnerability. For details, see NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2019-17526Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
VAR-201910-1676 CVE-2019-12147 Sangoma Session Border Controller Injection vulnerability

Related entries in the VARIoT exploits database: VAR-E-201910-0056
CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to Argument Injection via special characters in the username field. Upon successful exploitation, a remote unauthenticated user can create a local system user with sudo privileges, and use that user to login to the system (either via the web interface or via SSH) to achieve complete compromise of the device. This affects /var/webconfig/gui/Webconfig.inc.php and /usr/local/sng/bin/sng-user-mgmt. Sangoma Technologies SBC is a Border Session Controller (SBC) from Sangoma Technologies of Canada. A security vulnerability exists in the Sangoma Technologies SBC 2.3.23-119-GA version. Attackers can use the application's login interface to exploit the vulnerability to create privileged accounts on the system
VAR-201910-1211 CVE-2019-13541 Horner Automation Cscape Input validation error vulnerability CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker to access information and remotely execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. Horner Automation Cscape is a set of programming software for the development of industrial control systems by Horner Automation
VAR-201910-0848 CVE-2019-17668 Samsung Galaxy S10 and Note10 Vulnerability related to input validation on devices CVSS V2: 4.4
CVSS V3: 6.8
Severity: MEDIUM
Samsung Galaxy S10 and Note10 devices allow unlock operations via unregistered fingerprints in certain situations involving a third-party screen protector. Samsung Galaxy S10 and Note10 The device contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Samsung Galaxy S10 and Samsung Galaxy Note10 are both smartphones of the Korean company Samsung. There are security holes in Samsung Galaxy S10 and Samsung Galaxy Note10. An attacker can use the unregistered fingerprint to use the vulnerability to open the phone
VAR-201910-0335 CVE-2019-12611 Bitdefender BOX Vulnerability related to allocation of resources without restrictions or throttling in firmware CVSS V2: 4.9
CVSS V3: 4.4
Severity: MEDIUM
An issue was discovered in Bitdefender BOX firmware versions before 2.1.37.37-34 that affects the general reliability of the product. Specially crafted packets sent to the miniupnpd implementation in result in the device allocating memory without freeing it later. This behavior can cause the miniupnpd component to crash or to trigger a device reboot. Bitdefender BOX The firmware contains a vulnerability related to resource allocation without restrictions or throttling.Service operation interruption (DoS) There is a possibility of being put into a state