VARIoT IoT vulnerabilities database

VAR-201909-0528 | CVE-2019-14753 | SICK FX0-GPNT00000 and FX0-GENT00000 Classic buffer overflow vulnerability in devices |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
SICK FX0-GPNT00000 and FX0-GENT00000 devices through 3.4.0 have a Buffer Overflow. SICK FX0-GPNT00000 and FX0-GENT00000 The device contains a classic buffer overflow vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Sick FX0-GPNT00000 and FX0-GENT00000 are both safety control modules with built-in Ethernet switches from Sick, Germany. A buffer error vulnerability exists in SICK FX0-GPNT00000 and FX0-GENT00000 versions 3.4.0 and earlier. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations
VAR-201909-1027 | CVE-2019-14238 | STMicroelectronics STM32F7 Authentication vulnerabilities in devices |
CVSS V2: 4.6 CVSS V3: 6.6 Severity: MEDIUM |
On STMicroelectronics STM32F7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated with a debug probe via the Instruction Tightly Coupled Memory (ITCM) bus. STMicroelectronics STM32F7 The device contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. STMicroelectronics STM32F7 is a microcontroller for embedded systems from STMicroelectronics, Switzerland. A security vulnerability exists in STMicroelectronics STM32F7
VAR-201909-1552 | No CVE | NApro has authentication bypass vulnerability |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
NAPro is a PLC programming software developed by Nandao Technology Jiangsu Co., Ltd.
NApro has an authentication bypass vulnerability. An attacker can use this vulnerability to control the PLC through the modified host software to perform arbitrary operations
VAR-201909-1554 | No CVE | Haiwell PLC has authentication bypass vulnerability |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
Xiamen Haiwei Technology Co., Ltd. is a high-tech enterprise integrating independent research and development, production, sales and service.
Haiwell PLC has an authentication bypass vulnerability that can be exploited by unauthorized attackers to cause unauthorized access to the controller
VAR-201909-1558 | No CVE | Schneider Electric Modicon M340 PLC Has Unauthorized Access Vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Schneider Electric Modicon M340 is a medium-sized PLC of Schneider Electric, which is widely used in the field of industrial control in China.
Schneider Electric Modicon M340 PLC has an unauthorized access vulnerability. An attacker can exploit the vulnerability without having to log in to an account, and delete a user's password by constructing a special link
VAR-201909-1551 | No CVE | Schneider Electric Modicon M340 PLC Has Click Hijacking Vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Schneider Electric Modicon M340 is a medium-sized PLC of Schneider Electric, which is widely used in the field of industrial control in China.
Schneider Electric Modicon M340 PLC has a click hijacking vulnerability. Attackers can tamper with user passwords by constructing special links
VAR-201909-1555 | No CVE | Schneider Electric Modicon M340 PLC Has Unauthorized Access Vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Schneider Electric Modicon M340 is a medium-sized PLC of Schneider Electric, which is widely used in the field of industrial control in China.
Schneider Electric Modicon M340 PLC has an unauthorized access vulnerability. An attacker can exploit the vulnerabilities without logging in to the administrator account, by constructing special links, tampering with user passwords, and obtaining sensitive information
VAR-201909-1553 | No CVE | NAPro has a backdoor vulnerability |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
NAPro is a PLC programming software developed by Nanda Autotech Jiangsu Co., Ltd.
NAPro has a backdoor vulnerability. Attackers can use this vulnerability to log in to the PLC to perform illegal operations
VAR-201909-1564 | No CVE | Authentication Bypass Vulnerability in Unity Pro XL |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
Unity Pro XL is a PLC programming software from Schneider Electric.
There is an authentication bypass vulnerability in Unity Pro XL, which can be used by unauthorized attackers to access the PLC
VAR-201909-1028 | CVE-2019-14239 | plural NXP Kinetis Authentication vulnerabilities in product devices |
CVSS V2: 4.6 CVSS V3: 6.6 Severity: MEDIUM |
On NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices, Flash Access Controls (FAC) (a software IP protection method for execute-only access) can be defeated by leveraging a load instruction inside the execute-only region to expose the protected code into a CPU register. NXP Kinetis KV1x , KV3x , K8x Devices have authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NXP Semiconductors NXP Kinetis KV1x, etc. are all microcontrollers from NXP Semiconductors in the Netherlands. A security vulnerability exists in NXP Semiconductors NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x. An attacker could exploit this vulnerability to bypass Flash Access Controls (FAC) protection
VAR-201909-0026 | CVE-2019-6175 | Lenovo System Update Input validation vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A denial of service vulnerability was reported in Lenovo System Update versions prior to 5.07.0088 that could allow configuration files to be written to non-standard locations. Lenovo System Update Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Lenovo 3000 C100, etc. are all products of China Lenovo (Lenovo). The Lenovo 3000 C100 is a laptop. The Lenovo 3000 C200 is a laptop. Lenovo ThinkCentre is a desktop computer. Lenovo System Update is one of the system update tools. A denial of service vulnerability exists in several Lenovo products. An attacker could exploit this vulnerability to cause a denial of service. The following products and versions are affected: Lenovo 3000 C100; 3000 C200; 3000 N100; 3000 N200; 3000 V100; 3000 V200; Lenovo 3000 J100; ;3000 S200p;3000 S205;ThinkPad;ThinkCentre;ThinkStation;Lenovo V Series;B Series;K Series;E Series
VAR-201909-0088 | CVE-2019-3416 | ZTE ZXV10 B860A Input Validation Error Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
All versions up to V81511329.1008 of ZTE ZXV10 B860A products are impacted by input validation vulnerability. Due to input validation, unauthorized users can take advantage of this vulnerability to control the user terminal system. ZTE ZXV10 B860A The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZTE ZXV10 B860A is a network set-top box of China ZTE Corporation
VAR-201909-0718 | CVE-2019-16518 | Swell Kit Mod Vulnerability in leaking resources to the wrong area in devices |
CVSS V2: 3.3 CVSS V3: 4.3 Severity: MEDIUM |
An issue was discovered on Swell Kit Mod devices that use the Vandy Vape platform. An attacker may be able to trigger an unintended temperature in the victim's mouth and throat via Bluetooth Low Energy (BLE) packets that specify large power or voltage values. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
VAR-201909-1368 | CVE-2018-21019 | Home Assistant Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application's error log via components/api.py. This system is mainly used to control home automation equipment
VAR-201909-1663 | No CVE | Logical flaw in security certification of a model of Dahua webcam |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Zhejiang Dahua Technology Co., Ltd. is a smart IoT solution provider and operator based on video.
There is a logic flaw in the security authentication of a certain Dahua webcam. Attackers can forge data packets and call interfaces to execute arbitrary commands.
VAR-201909-0757 | CVE-2019-16649 | plural Supermicro Vulnerabilities related to the use of hard-coded credentials in products |
CVSS V2: 5.0 CVSS V3: 10.0 Severity: CRITICAL |
On Supermicro H11, H12, M11, X9, X10, and X11 products, a combination of encryption and authentication problems in the virtual media service allows capture of BMC credentials and data transferred over virtual media devices. Attackers can use captured credentials to connect virtual USB devices to the server managed by the BMC. plural Supermicro The product contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SuperMicro Supermicro X10 and so on are all server motherboards of American SuperMicro company. A security vulnerability exists in the virtual media service in several Supermicro products. The following products and versions are affected: SuperMicro Supermicro H11; Supermicro H12; Supermicro M11; Supermicro X9; Supermicro X10; Supermicro X11
VAR-201909-0725 | CVE-2019-16650 | Supermicro Vulnerability in Permission Management |
CVSS V2: 7.5 CVSS V3: 10.0 Severity: CRITICAL |
On Supermicro X10 and X11 products, a client's access privileges may be transferred to a different client that later has the same socket file descriptor number. In opportunistic circumstances, an attacker can simply connect to the virtual media service, and then connect virtual USB devices to the server managed by the BMC. Supermicro Contains a privilege management vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SuperMicro Supermicro X10 and Supermicro X11 are both server motherboards of SuperMicro Corporation in the United States. A security vulnerability exists in SuperMicro Supermicro X10 and Supermicro X11
VAR-201909-0756 | CVE-2019-16645 | Embedthis GoAhead Injection vulnerability in |
CVSS V2: 5.0 CVSS V3: 8.6 Severity: HIGH |
An issue was discovered in Embedthis GoAhead 2.5.0. Certain pages (such as goform/login and config/log_off_page.htm) create links containing a hostname obtained from an arbitrary HTTP Host header sent by an attacker. This could potentially be used in a phishing attack. Embedthis GoAhead There is an injection vulnerability in.Information may be tampered with. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company. A security vulnerability exists in Embedthis Software GoAhead version 2.5.0
VAR-201909-0723 | CVE-2019-16533 | DrayTek Vigor2925 Cross-site scripting vulnerability in device firmware |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product. DrayTek Vigor2925 The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. DrayTek Vigor2925 is a wireless firewall router produced by DrayTek, Taiwan. The vulnerability is caused by the lack of correct verification of client data in the WEB application. Attackers can use this vulnerability to execute client code
VAR-201909-0724 | CVE-2019-16534 | DrayTek Vigor2925 Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product. DrayTek Vigor2925 The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. DrayTek Vigor2925 is a wireless firewall router from DrayTek, Taiwan. A cross-site scripting vulnerability exists in DrayTek Vigor 2925 with firmware version 3.8.4.3 that could allow an attacker to execute client-side code. The vulnerability stems from the lack of correct validation of client data in WEB applications