VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201909-0894 CVE-2019-16900 Advantech WebAccess/HMI Designer Buffer error vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Advantech WebAccess/HMI Designer 2.1.9.31 has a User Mode Write AV starting at MSVCR90!memcpy+0x000000000000015c. Advantech WebAccess/HMI Designer Contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Advantech WebAccess HMI Designer is a human machine interface (HMI) runtime development software. An attacker could exploit the vulnerability to cause a denial of service. The product has functions such as data transmission, menu editing and text editing. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations
VAR-201911-0834 CVE-2019-5229 P30 Vulnerability related to insufficient verification of data reliability on smartphones CVSS V2: 4.6
CVSS V3: 6.2
Severity: MEDIUM
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.193(C00E190R2P1) have an insufficient verification vulnerability. The system does not verify certain parameters sufficiently, an attacker should connect to the phone and gain high privilege to launch the attack, successful exploit could cause malicious code execution. P30 Smartphones are vulnerable to insufficient validation of data reliability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Huawei P30 is a smartphone from China's Huawei
VAR-201911-0265 CVE-2019-5288 P30 Integer overflow vulnerability in smartphones CVSS V2: 9.3
CVSS V3: 7.8
Severity: HIGH
P30 smart phones with versions earlier than ELLE-AL00B 9.1.0.193(C00E190R2P1) have an integer overflow vulnerability due to insufficient check on specific parameters. An attacker tricks the user into installing a malicious application, obtains the root permission and constructs specific parameters to the camera program to exploit this vulnerability. Successful exploit could cause the program to break down or allow for arbitrary code execution. P30 Smartphones contain an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Huawei P30 is a smartphone from China's Huawei
VAR-201909-1523 CVE-2019-12665 Cisco IOS and IOS XE Vulnerability regarding cryptographic strength in software CVSS V2: 5.8
CVSS V3: 7.4
Severity: HIGH
A vulnerability in the HTTP client feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to read and modify data that should normally have been sent via an encrypted channel. The vulnerability is due to TCP port information not being considered when matching new requests to existing, persistent HTTP connections. An attacker could exploit this vulnerability by acting as a man-in-the-middle and then reading and/or modifying data that should normally have been sent through an encrypted channel. Cisco IOS and IOS XE The software contains a cryptographic strength vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Both Cisco IOS and IOS XE are a set of operating systems developed by Cisco for its network equipment
VAR-201909-0895 CVE-2019-16901 Advantech WebAccess HMI Designer Exception Handler Chain Corruption Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Advantech WebAccess/HMI Designer 2.1.9.31 has Exception Handler Chain corruption starting at Unknown Symbol @ 0x0000000000000000 called from ntdll!RtlRaiseStatus+0x00000000000000b4. Advantech WebAccess/HMI Designer Contains a vulnerability in handling exceptional conditions.Service operation interruption (DoS) There is a possibility of being put into a state. Advantech WebAccess HMI Designer is a human machine interface (HMI) runtime development software. An attacker could exploit the vulnerability to cause a denial of service. The product has functions such as data transmission, menu editing and text editing. A path traversal vulnerability exists in Advantech WebAccess/HMI Designer version 2.1.9.31. The vulnerability stems from a network system or product that fails to properly filter resources or special elements in file paths
VAR-201909-0176 CVE-2019-12662 Cisco NX-OS and IOS XE Vulnerabilities related to digital signature verification in software CVSS V2: 7.2
CVSS V3: 6.7
Severity: MEDIUM
A vulnerability in Cisco NX-OS Software and Cisco IOS XE Software could allow an authenticated, local attacker with valid administrator or privilege level 15 credentials to load a virtual service image and bypass signature verification on an affected device. The vulnerability is due to improper signature verification during the installation of an Open Virtual Appliance (OVA) image. An authenticated, local attacker could exploit this vulnerability and load a malicious, unsigned OVA image on an affected device. A successful exploit could allow an attacker to perform code execution on a crafted software OVA image. Cisco NX-OS Software and IOS XE are both products of Cisco Corporation. Cisco NX-OS Software is a suite of data center-level operating system software for switches. IOS XE is a set of operating systems developed for its network equipment. A data forgery vulnerability exists in Cisco NX-OS and Cisco IOS XE. Signed OVA image
VAR-201909-0186 CVE-2019-12672 Cisco IOS XE Software link interpretation vulnerabilities CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
A vulnerability in the filesystem of Cisco IOS XE Software could allow an authenticated, local attacker with physical access to an affected device to execute arbitrary code on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient file location validation. An attacker could exploit this vulnerability by placing code in a specific format on a USB device and inserting it into an affected Cisco device. A successful exploit could allow the attacker to execute the code with root privileges on the underlying OS of the affected device. Cisco IOS XE The software contains a link interpretation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco IOS XE is an operating system developed by Cisco for its network equipment
VAR-201911-0266 CVE-2019-5289 ManageOne Vulnerable to out-of-bounds reading CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Gauss100 OLTP database in ManageOne with versions of 6.5.0 have an out-of-bounds read vulnerability due to the insufficient checks of the specific packet length. Attackers can construct invalid packets to attack the active and standby communication channels. Successful exploit of this vulnerability could allow the attacker to crash the database on the standby node. ManageOne Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei ManageOne is a set of cloud data center management solutions developed by China's Huawei (Huawei). The product supports unified management of heterogeneous cloud resource pools, and provides functions such as multi-level VDC matching customer organization model, service catalog planning, self-service, centralized alarm analysis, and intelligent operation and maintenance. There is a buffer error vulnerability in the Gauss100 OLTP database in Huawei ManageOne version 6.5.0
VAR-201909-0074 CVE-2019-6653 BIG-IQ Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
There is a Stored Cross Site Scripting vulnerability in the undisclosed page of a BIG-IQ 6.0.0-6.1.0 or 5.2.0-5.4.0 system. The attack can be stored by users granted the Device Manager and Administrator roles. BIG-IQ Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered
VAR-201909-0073 CVE-2019-6652 BIG-IQ Authentication vulnerability CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
In BIG-IQ 6.0.0-6.1.0, services for stats do not require authentication nor do they implement any form of Transport Layer Security (TLS). BIG-IQ Contains an authentication vulnerability.Information may be obtained and information may be altered. F5 BIG-IQ Centralized Management is a set of software-based cloud management solutions from F5 Corporation of the United States. The solution supports the deployment of application delivery and network services across public and private clouds, traditional data centers and hybrid environments. A security vulnerability exists in F5 BIG-IQ Centralized Management versions 6.0.0 through 6.1.0. An attacker could exploit this vulnerability to gain full access to the statistics database on the BIG-IQ system. Successfully exploiting this issue may allow an malicious user to bypass certain security restrictions and perform unauthorized actions
VAR-201909-0071 CVE-2019-6656 BIG-IP APM Edge Client Vulnerable to information disclosure from log files CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
BIG-IP APM Edge Client before version 7.1.8 (7180.2019.508.705) logs the full apm session ID in the log files. Vulnerable versions of the client are bundled with BIG-IP APM versions 15.0.0-15.0.1, 14,1.0-14.1.0.6, 14.0.0-14.0.0.4, 13.0.0-13.1.1.5, 12.1.0-12.1.5, and 11.5.1-11.6.5. In BIG-IP APM 13.1.0 and later, the APM Clients components can be updated independently from BIG-IP software. Client version 7.1.8 (7180.2019.508.705) and later has the fix
VAR-201909-0993 CVE-2019-13527 Rockwell Automation Arena Simulation Software Cat. 9502-Ax Vulnerable to uninitialized pointer access CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
In Rockwell Automation Arena Simulation Software Cat. 9502-Ax, Versions 16.00.00 and earlier, a maliciously crafted Arena file opened by an unsuspecting user may result in the use of a pointer that has not been initialized. 9502-Ax Contains a vulnerability in uninitialized pointer access.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of DOE files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. 9502-Ax 16.00.00 and previous versions have security vulnerabilities. 9502-Ax 16.00.00 and earlier
VAR-201909-0528 CVE-2019-14753 SICK FX0-GPNT00000 and FX0-GENT00000 Classic buffer overflow vulnerability in devices CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
SICK FX0-GPNT00000 and FX0-GENT00000 devices through 3.4.0 have a Buffer Overflow. SICK FX0-GPNT00000 and FX0-GENT00000 The device contains a classic buffer overflow vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Sick FX0-GPNT00000 and FX0-GENT00000 are both safety control modules with built-in Ethernet switches from Sick, Germany. A buffer error vulnerability exists in SICK FX0-GPNT00000 and FX0-GENT00000 versions 3.4.0 and earlier. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations
VAR-201909-1027 CVE-2019-14238 STMicroelectronics STM32F7 Authentication vulnerabilities in devices CVSS V2: 4.6
CVSS V3: 6.6
Severity: MEDIUM
On STMicroelectronics STM32F7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated with a debug probe via the Instruction Tightly Coupled Memory (ITCM) bus. STMicroelectronics STM32F7 The device contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. STMicroelectronics STM32F7 is a microcontroller for embedded systems from STMicroelectronics, Switzerland. A security vulnerability exists in STMicroelectronics STM32F7
VAR-201909-1552 No CVE NApro has authentication bypass vulnerability CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
NAPro is a PLC programming software developed by Nandao Technology Jiangsu Co., Ltd. NApro has an authentication bypass vulnerability. An attacker can use this vulnerability to control the PLC through the modified host software to perform arbitrary operations
VAR-201909-1554 No CVE Haiwell PLC has authentication bypass vulnerability CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
Xiamen Haiwei Technology Co., Ltd. is a high-tech enterprise integrating independent research and development, production, sales and service. Haiwell PLC has an authentication bypass vulnerability that can be exploited by unauthorized attackers to cause unauthorized access to the controller
VAR-201909-1558 No CVE Schneider Electric Modicon M340 PLC Has Unauthorized Access Vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Schneider Electric Modicon M340 is a medium-sized PLC of Schneider Electric, which is widely used in the field of industrial control in China. Schneider Electric Modicon M340 PLC has an unauthorized access vulnerability. An attacker can exploit the vulnerability without having to log in to an account, and delete a user's password by constructing a special link
VAR-201909-1551 No CVE Schneider Electric Modicon M340 PLC Has Click Hijacking Vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Schneider Electric Modicon M340 is a medium-sized PLC of Schneider Electric, which is widely used in the field of industrial control in China. Schneider Electric Modicon M340 PLC has a click hijacking vulnerability. Attackers can tamper with user passwords by constructing special links
VAR-201909-1555 No CVE Schneider Electric Modicon M340 PLC Has Unauthorized Access Vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Schneider Electric Modicon M340 is a medium-sized PLC of Schneider Electric, which is widely used in the field of industrial control in China. Schneider Electric Modicon M340 PLC has an unauthorized access vulnerability. An attacker can exploit the vulnerabilities without logging in to the administrator account, by constructing special links, tampering with user passwords, and obtaining sensitive information
VAR-201909-1553 No CVE NAPro has a backdoor vulnerability CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
NAPro is a PLC programming software developed by Nanda Autotech Jiangsu Co., Ltd. NAPro has a backdoor vulnerability. Attackers can use this vulnerability to log in to the PLC to perform illegal operations