VARIoT IoT vulnerabilities database

VAR-201909-0894 | CVE-2019-16900 | Advantech WebAccess/HMI Designer Buffer error vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Advantech WebAccess/HMI Designer 2.1.9.31 has a User Mode Write AV starting at MSVCR90!memcpy+0x000000000000015c. Advantech WebAccess/HMI Designer Contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Advantech WebAccess HMI Designer is a human machine interface (HMI) runtime development software. An attacker could exploit the vulnerability to cause a denial of service. The product has functions such as data transmission, menu editing and text editing. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations
VAR-201911-0834 | CVE-2019-5229 | P30 Vulnerability related to insufficient verification of data reliability on smartphones |
CVSS V2: 4.6 CVSS V3: 6.2 Severity: MEDIUM |
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.193(C00E190R2P1) have an insufficient verification vulnerability. The system does not verify certain parameters sufficiently, an attacker should connect to the phone and gain high privilege to launch the attack, successful exploit could cause malicious code execution. P30 Smartphones are vulnerable to insufficient validation of data reliability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Huawei P30 is a smartphone from China's Huawei
VAR-201911-0265 | CVE-2019-5288 | P30 Integer overflow vulnerability in smartphones |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
P30 smart phones with versions earlier than ELLE-AL00B 9.1.0.193(C00E190R2P1) have an integer overflow vulnerability due to insufficient check on specific parameters. An attacker tricks the user into installing a malicious application, obtains the root permission and constructs specific parameters to the camera program to exploit this vulnerability. Successful exploit could cause the program to break down or allow for arbitrary code execution. P30 Smartphones contain an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Huawei P30 is a smartphone from China's Huawei
VAR-201909-1523 | CVE-2019-12665 | Cisco IOS and IOS XE Vulnerability regarding cryptographic strength in software |
CVSS V2: 5.8 CVSS V3: 7.4 Severity: HIGH |
A vulnerability in the HTTP client feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to read and modify data that should normally have been sent via an encrypted channel. The vulnerability is due to TCP port information not being considered when matching new requests to existing, persistent HTTP connections. An attacker could exploit this vulnerability by acting as a man-in-the-middle and then reading and/or modifying data that should normally have been sent through an encrypted channel. Cisco IOS and IOS XE The software contains a cryptographic strength vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Both Cisco IOS and IOS XE are a set of operating systems developed by Cisco for its network equipment
VAR-201909-0895 | CVE-2019-16901 | Advantech WebAccess HMI Designer Exception Handler Chain Corruption Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Advantech WebAccess/HMI Designer 2.1.9.31 has Exception Handler Chain corruption starting at Unknown Symbol @ 0x0000000000000000 called from ntdll!RtlRaiseStatus+0x00000000000000b4. Advantech WebAccess/HMI Designer Contains a vulnerability in handling exceptional conditions.Service operation interruption (DoS) There is a possibility of being put into a state. Advantech WebAccess HMI Designer is a human machine interface (HMI) runtime development software. An attacker could exploit the vulnerability to cause a denial of service. The product has functions such as data transmission, menu editing and text editing. A path traversal vulnerability exists in Advantech WebAccess/HMI Designer version 2.1.9.31. The vulnerability stems from a network system or product that fails to properly filter resources or special elements in file paths
VAR-201909-0176 | CVE-2019-12662 | Cisco NX-OS and IOS XE Vulnerabilities related to digital signature verification in software |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in Cisco NX-OS Software and Cisco IOS XE Software could allow an authenticated, local attacker with valid administrator or privilege level 15 credentials to load a virtual service image and bypass signature verification on an affected device. The vulnerability is due to improper signature verification during the installation of an Open Virtual Appliance (OVA) image. An authenticated, local attacker could exploit this vulnerability and load a malicious, unsigned OVA image on an affected device. A successful exploit could allow an attacker to perform code execution on a crafted software OVA image. Cisco NX-OS Software and IOS XE are both products of Cisco Corporation. Cisco NX-OS Software is a suite of data center-level operating system software for switches. IOS XE is a set of operating systems developed for its network equipment.
A data forgery vulnerability exists in Cisco NX-OS and Cisco IOS XE. Signed OVA image
VAR-201909-0186 | CVE-2019-12672 | Cisco IOS XE Software link interpretation vulnerabilities |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
A vulnerability in the filesystem of Cisco IOS XE Software could allow an authenticated, local attacker with physical access to an affected device to execute arbitrary code on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient file location validation. An attacker could exploit this vulnerability by placing code in a specific format on a USB device and inserting it into an affected Cisco device. A successful exploit could allow the attacker to execute the code with root privileges on the underlying OS of the affected device. Cisco IOS XE The software contains a link interpretation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco IOS XE is an operating system developed by Cisco for its network equipment
VAR-201911-0266 | CVE-2019-5289 | ManageOne Vulnerable to out-of-bounds reading |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Gauss100 OLTP database in ManageOne with versions of 6.5.0 have an out-of-bounds read vulnerability due to the insufficient checks of the specific packet length. Attackers can construct invalid packets to attack the active and standby communication channels. Successful exploit of this vulnerability could allow the attacker to crash the database on the standby node. ManageOne Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei ManageOne is a set of cloud data center management solutions developed by China's Huawei (Huawei). The product supports unified management of heterogeneous cloud resource pools, and provides functions such as multi-level VDC matching customer organization model, service catalog planning, self-service, centralized alarm analysis, and intelligent operation and maintenance. There is a buffer error vulnerability in the Gauss100 OLTP database in Huawei ManageOne version 6.5.0
VAR-201909-0074 | CVE-2019-6653 | BIG-IQ Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
There is a Stored Cross Site Scripting vulnerability in the undisclosed page of a BIG-IQ 6.0.0-6.1.0 or 5.2.0-5.4.0 system. The attack can be stored by users granted the Device Manager and Administrator roles. BIG-IQ Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered
VAR-201909-0073 | CVE-2019-6652 | BIG-IQ Authentication vulnerability |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
In BIG-IQ 6.0.0-6.1.0, services for stats do not require authentication nor do they implement any form of Transport Layer Security (TLS). BIG-IQ Contains an authentication vulnerability.Information may be obtained and information may be altered. F5 BIG-IQ Centralized Management is a set of software-based cloud management solutions from F5 Corporation of the United States. The solution supports the deployment of application delivery and network services across public and private clouds, traditional data centers and hybrid environments. A security vulnerability exists in F5 BIG-IQ Centralized Management versions 6.0.0 through 6.1.0. An attacker could exploit this vulnerability to gain full access to the statistics database on the BIG-IQ system.
Successfully exploiting this issue may allow an malicious user to bypass certain security restrictions and perform unauthorized actions
VAR-201909-0071 | CVE-2019-6656 | BIG-IP APM Edge Client Vulnerable to information disclosure from log files |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
BIG-IP APM Edge Client before version 7.1.8 (7180.2019.508.705) logs the full apm session ID in the log files. Vulnerable versions of the client are bundled with BIG-IP APM versions 15.0.0-15.0.1, 14,1.0-14.1.0.6, 14.0.0-14.0.0.4, 13.0.0-13.1.1.5, 12.1.0-12.1.5, and 11.5.1-11.6.5. In BIG-IP APM 13.1.0 and later, the APM Clients components can be updated independently from BIG-IP software. Client version 7.1.8 (7180.2019.508.705) and later has the fix
VAR-201909-0993 | CVE-2019-13527 | Rockwell Automation Arena Simulation Software Cat. 9502-Ax Vulnerable to uninitialized pointer access |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
In Rockwell Automation Arena Simulation Software Cat. 9502-Ax, Versions 16.00.00 and earlier, a maliciously crafted Arena file opened by an unsuspecting user may result in the use of a pointer that has not been initialized. 9502-Ax Contains a vulnerability in uninitialized pointer access.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of DOE files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. 9502-Ax 16.00.00 and previous versions have security vulnerabilities. 9502-Ax 16.00.00 and earlier
VAR-201909-0528 | CVE-2019-14753 | SICK FX0-GPNT00000 and FX0-GENT00000 Classic buffer overflow vulnerability in devices |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
SICK FX0-GPNT00000 and FX0-GENT00000 devices through 3.4.0 have a Buffer Overflow. SICK FX0-GPNT00000 and FX0-GENT00000 The device contains a classic buffer overflow vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Sick FX0-GPNT00000 and FX0-GENT00000 are both safety control modules with built-in Ethernet switches from Sick, Germany. A buffer error vulnerability exists in SICK FX0-GPNT00000 and FX0-GENT00000 versions 3.4.0 and earlier. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations
VAR-201909-1027 | CVE-2019-14238 | STMicroelectronics STM32F7 Authentication vulnerabilities in devices |
CVSS V2: 4.6 CVSS V3: 6.6 Severity: MEDIUM |
On STMicroelectronics STM32F7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated with a debug probe via the Instruction Tightly Coupled Memory (ITCM) bus. STMicroelectronics STM32F7 The device contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. STMicroelectronics STM32F7 is a microcontroller for embedded systems from STMicroelectronics, Switzerland. A security vulnerability exists in STMicroelectronics STM32F7
VAR-201909-1552 | No CVE | NApro has authentication bypass vulnerability |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
NAPro is a PLC programming software developed by Nandao Technology Jiangsu Co., Ltd.
NApro has an authentication bypass vulnerability. An attacker can use this vulnerability to control the PLC through the modified host software to perform arbitrary operations
VAR-201909-1554 | No CVE | Haiwell PLC has authentication bypass vulnerability |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
Xiamen Haiwei Technology Co., Ltd. is a high-tech enterprise integrating independent research and development, production, sales and service.
Haiwell PLC has an authentication bypass vulnerability that can be exploited by unauthorized attackers to cause unauthorized access to the controller
VAR-201909-1558 | No CVE | Schneider Electric Modicon M340 PLC Has Unauthorized Access Vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Schneider Electric Modicon M340 is a medium-sized PLC of Schneider Electric, which is widely used in the field of industrial control in China.
Schneider Electric Modicon M340 PLC has an unauthorized access vulnerability. An attacker can exploit the vulnerability without having to log in to an account, and delete a user's password by constructing a special link
VAR-201909-1551 | No CVE | Schneider Electric Modicon M340 PLC Has Click Hijacking Vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Schneider Electric Modicon M340 is a medium-sized PLC of Schneider Electric, which is widely used in the field of industrial control in China.
Schneider Electric Modicon M340 PLC has a click hijacking vulnerability. Attackers can tamper with user passwords by constructing special links
VAR-201909-1555 | No CVE | Schneider Electric Modicon M340 PLC Has Unauthorized Access Vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Schneider Electric Modicon M340 is a medium-sized PLC of Schneider Electric, which is widely used in the field of industrial control in China.
Schneider Electric Modicon M340 PLC has an unauthorized access vulnerability. An attacker can exploit the vulnerabilities without logging in to the administrator account, by constructing special links, tampering with user passwords, and obtaining sensitive information
VAR-201909-1553 | No CVE | NAPro has a backdoor vulnerability |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
NAPro is a PLC programming software developed by Nanda Autotech Jiangsu Co., Ltd.
NAPro has a backdoor vulnerability. Attackers can use this vulnerability to log in to the PLC to perform illegal operations