VARIoT IoT vulnerabilities database
| VAR-202002-1703 | No CVE | Schneider M580 has a denial of service vulnerability (CNVD-2020-04563) |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Schneider Electric SA is a global electrical company headquartered in France.
Schneider M580 has a denial of service vulnerability. An attacker can use this vulnerability to send a carefully constructed 0x65 function code data message, which causes the PLC to enter a fatal failure mode. It can only return to normal after manual power-on.
| VAR-202002-1704 | No CVE | Schneider M580 has a denial of service vulnerability (CNVD-2020-04562) |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Schneider Electric SA is a global electrical company headquartered in France, a global expert in energy efficiency management and automation.
Schneider M580 has a denial of service vulnerability, which can be used by an attacker to cause the PLC's internal configuration logic program to be lost and unable to perform the intended control.
| VAR-202002-1684 | No CVE | Shijiazhuang Hejia Technology Co., Ltd. information room vulnerability monitoring loopholes |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The equipment room moving ring monitoring system is a monitoring function of the equipment room's important environment and power equipment, including environmental equipment monitoring (temperature, humidity, smoke, flooding, precision air conditioning, ordinary air conditioning, new fans, etc.), power equipment monitoring (power distribution, Generator, UPS, battery, lightning arrester, etc.), security equipment monitoring (fire protection, access control, video, etc.), etc.
An information disclosure vulnerability exists in the Shijiazhuang Hejia Technology Co., Ltd. computer room moving ring monitoring system. Attackers can use this vulnerability to access sensitive information.
| VAR-202002-1692 | No CVE | SQL Injection Vulnerability in Shijiazhuang Hejia Technology Co., Ltd. Computer Room Dynamic Monitoring System |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The equipment room moving ring monitoring system is a monitoring function of the equipment room's important environment and power equipment, including environmental equipment monitoring (temperature, humidity, smoke, flooding, precision air conditioning, ordinary air conditioning, new fans, etc.), power equipment monitoring (power distribution, Generator, UPS, battery, lightning arrester, etc.), security equipment monitoring (fire protection, access control, video, etc.), etc.
There is a SQL injection vulnerability in the Shijiazhuang Hejia Technology Co., Ltd. computer room dynamic ring monitoring system. Attackers can use this vulnerability to obtain sensitive information in the database.
| VAR-202002-0477 | CVE-2019-19452 | Patriot Viper RGB Out-of-bounds write vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A buffer overflow was found in Patriot Viper RGB through 1.1 when processing IoControlCode 0x80102040. Local attackers (including low integrity processes) can exploit this to gain NT AUTHORITY\SYSTEM privileges. Patriot Viper RGB Is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
| VAR-202002-1214 | CVE-2020-6841 | D-Link DCH-M225 On the device OS Command injection vulnerabilities |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DCH-M225 1.05b01 and earlier devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the spotifyConnect.php userName parameter. D-Link DCH-M225 On the device OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. DCH-M225 is a Wifi portable audio extender.
D-Link DCH-M225 1.05b01 and earlier versions have an arbitrary OS command execution vulnerability
| VAR-202002-1215 | CVE-2020-6842 | D-Link DCH-M225 On the device OS Command injection vulnerabilities |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
D-Link DCH-M225 1.05b01 and earlier devices allow remote authenticated admins to execute arbitrary OS commands via shell metacharacters in the media renderer name. D-Link DCH-M225 On the device OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. DCH-M225 is a Wifi portable audio extender.
D-Link DCH-M225 1.05b01 and earlier versions have an arbitrary OS command execution vulnerability
| VAR-202002-1113 | CVE-2020-5326 | Dell Vulnerability in lack of authentication for critical features on client platforms |
CVSS V2: 2.1 CVSS V3: 5.3 Severity: MEDIUM |
Affected Dell Client platforms contain a BIOS Setup configuration authentication bypass vulnerability in the pre-boot Intel Rapid Storage Response Technology (iRST) Manager menu. An attacker with physical access to the system could perform unauthorized changes to the BIOS Setup configuration settings without requiring the BIOS Admin password by selecting the Optimized Defaults option in the pre-boot iRST Manager. Dell A vulnerability exists in the client platform regarding the lack of authentication for critical features.Information may be tampered with
| VAR-202002-0603 | CVE-2020-1844 | PCManager Vulnerability related to authority management in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
PCManager with versions earlier than 10.0.5.51 have a privilege escalation vulnerability in Huawei PCManager products. An authenticated, local attacker can perform specific operation to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. PCManager Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Huawei PCManager is a set of computer management software developed by China Huawei (Huawei)
| VAR-202002-1717 | No CVE | (Pwn2Own) Samsung Galaxy S10 IndexedDB Use-After-Free Sandbox Escape Vulnerability |
CVSS V2: - CVSS V3: 8.4 Severity: HIGH |
This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Samsung Galaxy S10. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the IndexedDBDatabase::Close method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and escape the Chromium sandbox.
| VAR-202002-1716 | No CVE | (Pwn2Own) Samsung Galaxy S10 FileWriter Use-After-Free Sandbox Escape Vulnerability |
CVSS V2: - CVSS V3: 8.4 Severity: HIGH |
This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Samsung Galaxy S10. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of arrays in FileWriterImpl::Write. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and escape the Chromium sandbox.
| VAR-202002-1367 | CVE-2020-8860 | Samsung Galaxy S10 Firmware device Exynos Out-of-bounds write vulnerabilities in chipsets |
CVSS V2: 5.4 CVSS V3: 8.0 Severity: HIGH |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability in that the target must answer a phone call. The specific flaw exists within the Call Control Setup messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the baseband processor. Was ZDI-CAN-9658. Zero Day Initiative To this vulnerability ZDI-CAN-9658 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Samsung Galaxy 10 is a smartphone from Samsung in South Korea.
The Call Control Setup message in Samsung Galaxy 10 has a buffer overflow vulnerability. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
| VAR-202002-1712 | No CVE | (Pwn2Own) Samsung Galaxy S10 Out-Of-Bounds Write Remote Code Execution Vulnerability |
CVSS V2: - CVSS V3: 6.3 Severity: MEDIUM |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of arrays in JSCallReducer::ReduceArrayMap. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process.
| VAR-202002-1707 | No CVE | Omron Automation (China) Co., Ltd. Omron PLC has a denial of service vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Omron PLC is a compact PLC with complete functions that can provide high value-added machine control for industry-leading distributed control of conveying.
Omron (China) Co., Ltd. Omron PLC has a denial of service vulnerability. Attackers can use the vulnerability to cause a denial of service.
| VAR-202002-1695 | No CVE | Realtek Semiconductor Co., Ltd. Realtek chip ADSL modem/optical modem serial port has command execution vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Realtek (Realtek) is a supplier of audio and network chips.
Realtek Semiconductor Co., Ltd. Realtek chip ADSL modem/optical modem serial port has a command execution vulnerability. Attackers can use this vulnerability to access the backdoor through any IPv4 address of the modem and directly read and write the serial port.
| VAR-202002-1698 | No CVE | The configuration monitoring system of Beijing Jiekong Technology Co., Ltd. has a code execution vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
FameView configuration software is a high-performance configuration monitoring software independently researched and developed by Beijing Jiekong Company with many years of engineering application and service experience, based on the Windows operating system, and provides economical and complete automation solutions.
The configuration monitoring system of Beijing Jiekong Technology Co., Ltd. has code execution vulnerabilities. Attackers can use the vulnerabilities to construct malicious links to induce users to analyze and execute arbitrary code in the context of the application.
| VAR-202002-1699 | No CVE | Backdoor vulnerability exists in FameView configuration monitoring system of Beijing Jiekong |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
FameView configuration software is a high-performance configuration monitoring software independently researched and developed by Beijing Jiekong Company with many years of engineering application and service experience, based on the Windows operating system, and provides economical and complete automation solutions.
The FameView configuration monitoring system of Beijing Jiekong Company has a backdoor vulnerability. Attackers can use the backdoor password to access the configuration monitoring system on any device of the manufacturer and modify the configuration on the device.
| VAR-202002-1682 | No CVE | Shenzhen Anjubao Electronics Co., Ltd. Marlboze/ Wanbaoze-w30 series cameras have weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Wanbaoze camera software can achieve various hardware alarm effects, allowing you to enjoy a real-time home monitoring experience, so that you can easily understand various situations in the home.
Shenzhen Anjubao Electronics Co., Ltd. Marlboze/ Wanbaoze-w30 series cameras have a weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
| VAR-202002-1683 | No CVE | Shenzhen Anjubao Electronics Co., Ltd. Marlboze/ Wanbaoze-w30 series cameras have command execution vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The Wanbaoze camera software can achieve various hardware alarm effects, allowing you to enjoy a real-time home monitoring experience, so that you can easily understand various situations in the home.
Shenzhen Anjubao Electronics Co., Ltd. Marlboze/ Wanbaoze-w30 series cameras have a command execution vulnerability. Attackers can use this vulnerability to implement command injection without authorization.
| VAR-202003-1594 | CVE-2020-6972 | Notifier Web Server In Capture-replay Vulnerability related to authentication bypass by |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
In Notifier Web Server (NWS) Version 3.50 and earlier, the Honeywell Fire Web Server’s authentication may be bypassed by a capture-replay attack from a web browser. NOTI? FIRE? NET Web Server is a web-based HTML server that allows you to remotely access the NOTI? FIRE? NET network via the Internet or an intranet. An attacker could use this vulnerability to bypass authentication through a browser capture-replay attack