VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202003-0348 CVE-2020-0502 Intel(R) Graphics Driver Vulnerability related to authority management in CVSS V2: 4.6
CVSS V3: 5.3
Severity: MEDIUM
Improper access control in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) Graphics Driver Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Intel Graphics Drivers is an integrated graphics driver from Intel Corporation. A local attacker could exploit this vulnerability to elevate privileges
VAR-202003-0347 CVE-2020-0501 Intel(R) Graphics Driver Classic buffer overflow vulnerability in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Buffer overflow in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable a denial of service via local access. Intel(R) Graphics Driver Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be put into a state. Intel Graphics Drivers is an integrated graphics driver from Intel Corporation. A local attacker could exploit this vulnerability to cause a denial of service
VAR-202003-0341 CVE-2020-0567 Intel(R) Graphics Driver Vulnerability in CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access. Intel(R) Graphics Driver There is an unspecified vulnerability in.Service operation interruption (DoS) It may be put into a state. Intel Graphics Drivers is an integrated graphics driver from Intel Corporation. A local attacker could exploit this vulnerability to cause a denial of service
VAR-202003-0340 CVE-2020-0565 Intel(R) Graphics Driver Vulnerability in uncontrolled search path elements in CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Uncontrolled search path in Intel(R) Graphics Drivers before version 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) Graphics Driver There is a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Intel Graphics Drivers is an integrated graphics driver from Intel Corporation. A security vulnerability exists in versions prior to Intel Graphics Drivers 26.20.100.7158. A local attacker could exploit this vulnerability to elevate privileges
VAR-202003-0685 CVE-2019-5167 WAGO PFC 200 Injection vulnerabilities in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). At 0x1e3f0 the extracted dns value from the xml file is used as an argument to /etc/config-tools/edit_dns_server %s dns-server-nr=%d dns-server-name=<contents of dns node> using sprintf(). This command is later executed via a call to system(). This is done in a loop and there is no limit to how many dns entries will be parsed from the xml file. (DoS) It may be put into a state. WAGO PFC200 is a programmable logic controller (PLC) from German WAGO company. An attacker could exploit this vulnerability to inject OS commands through a specially crafted XML cache file
VAR-202003-0002 CVE-2011-4538 plural Lexmark Information leakage vulnerabilities in devices CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Lexmark X, W, T, E, and C devices before 2012-02-09 allow attackers to obtain sensitive information by reading passwords within exported settings. plural Lexmark The device contains a vulnerability related to information leakage.Information may be obtained. Lexmark X, etc. are all products of Lexmark. Lexmark X is an X series printer. Lexmark W is a W series printer. Lexmark T is a T series printer. An information disclosure vulnerability exists in many Lexmark products, and an attacker can use the vulnerability to read the password
VAR-202003-0701 CVE-2019-5184 WAGO PFC 200 Resource Management Error Vulnerability CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
An exploitable double free vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. A specially crafted XML cache file written to a specific location on the device can cause a heap pointer to be freed twice, resulting in a denial of service and potentially code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file. (DoS) It may be put into a state. WAGO PFC 200 is a programmable logic controller (PLC) of the German WAGO company
VAR-202003-0003 CVE-2011-3269 plural Lexmark Information leakage vulnerabilities in products CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Lexmark X, W, T, E, C, 6500e, and 25xxN devices before 2011-11-15 allow attackers to obtain sensitive information via a hidden email address in a Scan To Email shortcut. plural Lexmark The product contains a vulnerability related to information leakage.Information may be obtained. Lexmark X, etc. are all products of Lexmark. Lexmark X is an X series printer. Lexmark W is a W series printer. Lexmark T is a T series printer. There are information disclosure vulnerabilities in many Lexmark products
VAR-202003-0678 CVE-2019-5156 WAGO PFC 200 In OS Command injection vulnerabilities CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
An exploitable command injection vulnerability exists in the cloud connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). An attacker can inject operating system commands into the TimeoutPrepared parameter value contained in the firmware update command. WAGO PFC 200 To OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. WAGO PFC200 is a programmable logic controller (PLC) of German WAGO company
VAR-202003-0702 CVE-2019-5185 WAGO PFC 200 Classic buffer overflow vulnerability in CVSS V2: 4.4
CVSS V3: 7.0
Severity: HIGH
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1ea28 the extracted state value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=<contents of state node> using sprintf(). The destination buffer sp+0x40 is overflowed with the call to sprintf() for any state values that are greater than 512-len("/etc/config-tools/config_interfaces interface=X1 state=") in length. Later, at 0x1ea08 strcpy() is used to copy the contents of the stack buffer that was overflowed sp+0x40 into sp+0x440. The buffer sp+0x440 is immediately adjacent to sp+0x40 on the stack. Therefore, there is no NULL termination on the buffer sp+0x40 since it overflowed into sp+0x440. The strcpy() will result in invalid memory access. An state value of length 0x3c9 will cause the service to crash. (DoS) It may be put into a state. WAGO PFC 200 is a programmable logic controller (PLC) from the German company WAGO
VAR-202003-0434 CVE-2020-10249 BWA DiREX-Pro Information leakage vulnerabilities in devices CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
BWA DiREX-Pro The device contains a vulnerability related to information leakage.Information may be obtained. BWA Technology DiREX-Pro is a network video recorder from German BWA Technology. There are security vulnerabilities in BWA Technology DiREX-Pro version 1.2181. An attacker can use this vulnerability to obtain the full path by sending an invalid 'name' parameter to the val_soft.php3 file
VAR-202003-0683 CVE-2019-5161 WAGO PFC 200 Data Forgery Vulnerability CVSS V2: 9.0
CVSS V3: 9.1
Severity: CRITICAL
An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges. WAGO PFC 200 Exists in an inadequate validation of data reliability vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. WAGO PFC 200 is a programmable logic controller (PLC) of the German WAGO company
VAR-202003-0435 CVE-2020-10250 BWA DiREX-Pro On the device OS Command injection vulnerabilities CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
BWA DiREX-Pro 1.2181 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the PKG parameter to uninstall.php3. BWA DiREX-Pro On the device OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. BWA Technology DiREX-Pro is a network video recorder of German BWA Technology company. There is a security vulnerability in BWA Technology DiREX-Pro version 1.2181
VAR-202003-0682 CVE-2019-5160 WAGO PFC200 Input validation error vulnerability CVSS V2: 6.5
CVSS V3: 9.1
Severity: CRITICAL
An exploitable improper host validation vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 Firmware versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted HTTPS POST request can cause the software to connect to an unauthorized host, resulting in unauthorized access to firmware update functionality. An attacker can send an authenticated HTTPS POST request to direct the Cloud Connectivity software to connect to an attacker controlled Azure IoT Hub node. WAGO PFC 200 There is an input verification vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. WAGO PFC 200 is a programmable logic controller (PLC) of the German WAGO company
VAR-202003-0694 CVE-2019-5176 WAGO PFC 200 Out-of-bounds write vulnerabilities in firmware CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file.The destination buffer sp+0x40 is overflowed with the call to sprintf() for any gateway values that are greater than 512-len(‘/etc/config-tools/config_default_gateway number=0 state=enabled value=‘) in length. A gateway value of length 0x7e2 will cause the service to crash. WAGO PFC 200 There is an out-of-bounds write vulnerability in the firmware.Service operation interruption (DoS) It may be put into a state. WAGO PFC200 is a programmable logic controller (PLC) from German WAGO company. An attacker could exploit this vulnerability through a specially crafted XML cache file to implement code execution and cause a denial of service
VAR-202003-0697 CVE-2019-5179 WAGO PFC 200 Out-of-bounds write vulnerabilities in firmware CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. WAGO PFC 200 There is an out-of-bounds write vulnerability in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. WAGO PFC200 is a programmable logic controller (PLC) from German WAGO company
VAR-202003-0673 CVE-2019-5107 WAGO e!Cockpit Vulnerability in plaintext transmission of important information in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A cleartext transmission vulnerability exists in the network communication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to network traffic can easily intercept, interpret, and manipulate data coming from, or destined for e!Cockpit. This includes passwords, configurations, and binaries being transferred to endpoints. WAGO e!Cockpit Includes a vulnerability in the transmission of important information in clear text.Information may be obtained. Cockpit is an interactive server management interface
VAR-202003-0677 CVE-2019-5155 WAGO PFC 200 Operating system command injection vulnerability CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
An exploitable command injection vulnerability exists in the cloud connectivity feature of WAGO PFC200. An attacker can inject operating system commands into any of the parameter values contained in the firmware update command. This affects WAGO PFC200 Firmware version 03.02.02(14), version 03.01.07(13), and version 03.00.39(12). WAGO PFC200 To OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. WAGO PFC 200 is a programmable logic controller (PLC) of the German WAGO company. The vulnerability stems from the fact that external input data constructs executable commands for the operating system, and the network system or product does not properly filter special characters and commands. Attackers can use this vulnerability to execute illegal operating system commands
VAR-202003-0689 CVE-2019-5171 WAGO PFC 200 In firmware OS Command injection vulnerabilities CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send specially crafted packet at 0x1ea48 to the extracted hostname value from the xml file that is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled ip-address=<contents of ip node> using sprintf(). (DoS) It may be put into a state. WAGO PFC200 is a programmable logic controller (PLC) from German WAGO company. The vulnerability stems from the fact that the network system or product did not properly filter the special characters, commands, etc. during the process of constructing the executable command of the operating system by external input data. An attacker could use this vulnerability to execute illegal operating system commands
VAR-202003-0433 CVE-2020-10248 BWA DiREX-Pro Information leakage vulnerabilities in devices CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
BWA DiREX-Pro 1.2181 devices allow remote attackers to discover passwords via a direct request to val_users.php3. BWA DiREX-Pro The device contains a vulnerability related to information leakage.Information may be obtained. BWA DiREX-Pro is a digital video recorder. BWA DiREX-Pro 1.2181 has a password disclosure vulnerability. A remote attacker could use this vulnerability to obtain a password by directly requesting val_users.php3