VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201909-0528 CVE-2019-14753 SICK FX0-GPNT00000 and FX0-GENT00000 Classic buffer overflow vulnerability in devices CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
SICK FX0-GPNT00000 and FX0-GENT00000 devices through 3.4.0 have a Buffer Overflow. SICK FX0-GPNT00000 and FX0-GENT00000 The device contains a classic buffer overflow vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Sick FX0-GPNT00000 and FX0-GENT00000 are both safety control modules with built-in Ethernet switches from Sick, Germany. A buffer error vulnerability exists in SICK FX0-GPNT00000 and FX0-GENT00000 versions 3.4.0 and earlier. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations
VAR-201909-1027 CVE-2019-14238 STMicroelectronics STM32F7 Authentication vulnerabilities in devices CVSS V2: 4.6
CVSS V3: 6.6
Severity: MEDIUM
On STMicroelectronics STM32F7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated with a debug probe via the Instruction Tightly Coupled Memory (ITCM) bus. STMicroelectronics STM32F7 The device contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. STMicroelectronics STM32F7 is a microcontroller for embedded systems from STMicroelectronics, Switzerland. A security vulnerability exists in STMicroelectronics STM32F7
VAR-201909-1552 No CVE NApro has authentication bypass vulnerability CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
NAPro is a PLC programming software developed by Nandao Technology Jiangsu Co., Ltd. NApro has an authentication bypass vulnerability. An attacker can use this vulnerability to control the PLC through the modified host software to perform arbitrary operations
VAR-201909-1554 No CVE Haiwell PLC has authentication bypass vulnerability CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
Xiamen Haiwei Technology Co., Ltd. is a high-tech enterprise integrating independent research and development, production, sales and service. Haiwell PLC has an authentication bypass vulnerability that can be exploited by unauthorized attackers to cause unauthorized access to the controller
VAR-201909-1558 No CVE Schneider Electric Modicon M340 PLC Has Unauthorized Access Vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Schneider Electric Modicon M340 is a medium-sized PLC of Schneider Electric, which is widely used in the field of industrial control in China. Schneider Electric Modicon M340 PLC has an unauthorized access vulnerability. An attacker can exploit the vulnerability without having to log in to an account, and delete a user's password by constructing a special link
VAR-201909-1551 No CVE Schneider Electric Modicon M340 PLC Has Click Hijacking Vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Schneider Electric Modicon M340 is a medium-sized PLC of Schneider Electric, which is widely used in the field of industrial control in China. Schneider Electric Modicon M340 PLC has a click hijacking vulnerability. Attackers can tamper with user passwords by constructing special links
VAR-201909-1555 No CVE Schneider Electric Modicon M340 PLC Has Unauthorized Access Vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Schneider Electric Modicon M340 is a medium-sized PLC of Schneider Electric, which is widely used in the field of industrial control in China. Schneider Electric Modicon M340 PLC has an unauthorized access vulnerability. An attacker can exploit the vulnerabilities without logging in to the administrator account, by constructing special links, tampering with user passwords, and obtaining sensitive information
VAR-201909-1553 No CVE NAPro has a backdoor vulnerability CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
NAPro is a PLC programming software developed by Nanda Autotech Jiangsu Co., Ltd. NAPro has a backdoor vulnerability. Attackers can use this vulnerability to log in to the PLC to perform illegal operations
VAR-201909-1564 No CVE Authentication Bypass Vulnerability in Unity Pro XL CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
Unity Pro XL is a PLC programming software from Schneider Electric. There is an authentication bypass vulnerability in Unity Pro XL, which can be used by unauthorized attackers to access the PLC
VAR-201909-1028 CVE-2019-14239 plural NXP Kinetis Authentication vulnerabilities in product devices CVSS V2: 4.6
CVSS V3: 6.6
Severity: MEDIUM
On NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices, Flash Access Controls (FAC) (a software IP protection method for execute-only access) can be defeated by leveraging a load instruction inside the execute-only region to expose the protected code into a CPU register. NXP Kinetis KV1x , KV3x , K8x Devices have authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NXP Semiconductors NXP Kinetis KV1x, etc. are all microcontrollers from NXP Semiconductors in the Netherlands. A security vulnerability exists in NXP Semiconductors NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x. An attacker could exploit this vulnerability to bypass Flash Access Controls (FAC) protection
VAR-201909-0026 CVE-2019-6175 Lenovo System Update Input validation vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A denial of service vulnerability was reported in Lenovo System Update versions prior to 5.07.0088 that could allow configuration files to be written to non-standard locations. Lenovo System Update Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Lenovo 3000 C100, etc. are all products of China Lenovo (Lenovo). The Lenovo 3000 C100 is a laptop. The Lenovo 3000 C200 is a laptop. Lenovo ThinkCentre is a desktop computer. Lenovo System Update is one of the system update tools. A denial of service vulnerability exists in several Lenovo products. An attacker could exploit this vulnerability to cause a denial of service. The following products and versions are affected: Lenovo 3000 C100; 3000 C200; 3000 N100; 3000 N200; 3000 V100; 3000 V200; Lenovo 3000 J100; ;3000 S200p;3000 S205;ThinkPad;ThinkCentre;ThinkStation;Lenovo V Series;B Series;K Series;E Series
VAR-201909-0088 CVE-2019-3416 ZTE ZXV10 B860A Input Validation Error Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
All versions up to V81511329.1008 of ZTE ZXV10 B860A products are impacted by input validation vulnerability. Due to input validation, unauthorized users can take advantage of this vulnerability to control the user terminal system. ZTE ZXV10 B860A The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZTE ZXV10 B860A is a network set-top box of China ZTE Corporation
VAR-201909-0718 CVE-2019-16518 Swell Kit Mod Vulnerability in leaking resources to the wrong area in devices CVSS V2: 3.3
CVSS V3: 4.3
Severity: MEDIUM
An issue was discovered on Swell Kit Mod devices that use the Vandy Vape platform. An attacker may be able to trigger an unintended temperature in the victim's mouth and throat via Bluetooth Low Energy (BLE) packets that specify large power or voltage values. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
VAR-201909-1368 CVE-2018-21019 Home Assistant Information Disclosure Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application's error log via components/api.py. This system is mainly used to control home automation equipment
VAR-201909-1663 No CVE Logical flaw in security certification of a model of Dahua webcam CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Zhejiang Dahua Technology Co., Ltd. is a smart IoT solution provider and operator based on video. There is a logic flaw in the security authentication of a certain Dahua webcam. Attackers can forge data packets and call interfaces to execute arbitrary commands.
VAR-201909-0757 CVE-2019-16649 plural Supermicro Vulnerabilities related to the use of hard-coded credentials in products CVSS V2: 5.0
CVSS V3: 10.0
Severity: CRITICAL
On Supermicro H11, H12, M11, X9, X10, and X11 products, a combination of encryption and authentication problems in the virtual media service allows capture of BMC credentials and data transferred over virtual media devices. Attackers can use captured credentials to connect virtual USB devices to the server managed by the BMC. plural Supermicro The product contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SuperMicro Supermicro X10 and so on are all server motherboards of American SuperMicro company. A security vulnerability exists in the virtual media service in several Supermicro products. The following products and versions are affected: SuperMicro Supermicro H11; Supermicro H12; Supermicro M11; Supermicro X9; Supermicro X10; Supermicro X11
VAR-201909-0725 CVE-2019-16650 Supermicro Vulnerability in Permission Management CVSS V2: 7.5
CVSS V3: 10.0
Severity: CRITICAL
On Supermicro X10 and X11 products, a client's access privileges may be transferred to a different client that later has the same socket file descriptor number. In opportunistic circumstances, an attacker can simply connect to the virtual media service, and then connect virtual USB devices to the server managed by the BMC. Supermicro Contains a privilege management vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SuperMicro Supermicro X10 and Supermicro X11 are both server motherboards of SuperMicro Corporation in the United States. A security vulnerability exists in SuperMicro Supermicro X10 and Supermicro X11
VAR-201909-0756 CVE-2019-16645 Embedthis GoAhead  Injection vulnerability in CVSS V2: 5.0
CVSS V3: 8.6
Severity: HIGH
An issue was discovered in Embedthis GoAhead 2.5.0. Certain pages (such as goform/login and config/log_off_page.htm) create links containing a hostname obtained from an arbitrary HTTP Host header sent by an attacker. This could potentially be used in a phishing attack. Embedthis GoAhead There is an injection vulnerability in.Information may be tampered with. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company. A security vulnerability exists in Embedthis Software GoAhead version 2.5.0
VAR-201909-0723 CVE-2019-16533 DrayTek Vigor2925 Cross-site scripting vulnerability in device firmware CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product. DrayTek Vigor2925 The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. DrayTek Vigor2925 is a wireless firewall router produced by DrayTek, Taiwan. The vulnerability is caused by the lack of correct verification of client data in the WEB application. Attackers can use this vulnerability to execute client code
VAR-201909-0724 CVE-2019-16534 DrayTek Vigor2925 Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product. DrayTek Vigor2925 The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. DrayTek Vigor2925 is a wireless firewall router from DrayTek, Taiwan. A cross-site scripting vulnerability exists in DrayTek Vigor 2925 with firmware version 3.8.4.3 that could allow an attacker to execute client-side code. The vulnerability stems from the lack of correct validation of client data in WEB applications