VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202002-1703 No CVE Schneider M580 has a denial of service vulnerability (CNVD-2020-04563) CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Schneider Electric SA is a global electrical company headquartered in France. Schneider M580 has a denial of service vulnerability. An attacker can use this vulnerability to send a carefully constructed 0x65 function code data message, which causes the PLC to enter a fatal failure mode. It can only return to normal after manual power-on.
VAR-202002-1704 No CVE Schneider M580 has a denial of service vulnerability (CNVD-2020-04562) CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Schneider Electric SA is a global electrical company headquartered in France, a global expert in energy efficiency management and automation. Schneider M580 has a denial of service vulnerability, which can be used by an attacker to cause the PLC's internal configuration logic program to be lost and unable to perform the intended control.
VAR-202002-1684 No CVE Shijiazhuang Hejia Technology Co., Ltd. information room vulnerability monitoring loopholes CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The equipment room moving ring monitoring system is a monitoring function of the equipment room's important environment and power equipment, including environmental equipment monitoring (temperature, humidity, smoke, flooding, precision air conditioning, ordinary air conditioning, new fans, etc.), power equipment monitoring (power distribution, Generator, UPS, battery, lightning arrester, etc.), security equipment monitoring (fire protection, access control, video, etc.), etc. An information disclosure vulnerability exists in the Shijiazhuang Hejia Technology Co., Ltd. computer room moving ring monitoring system. Attackers can use this vulnerability to access sensitive information.
VAR-202002-1692 No CVE SQL Injection Vulnerability in Shijiazhuang Hejia Technology Co., Ltd. Computer Room Dynamic Monitoring System CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The equipment room moving ring monitoring system is a monitoring function of the equipment room's important environment and power equipment, including environmental equipment monitoring (temperature, humidity, smoke, flooding, precision air conditioning, ordinary air conditioning, new fans, etc.), power equipment monitoring (power distribution, Generator, UPS, battery, lightning arrester, etc.), security equipment monitoring (fire protection, access control, video, etc.), etc. There is a SQL injection vulnerability in the Shijiazhuang Hejia Technology Co., Ltd. computer room dynamic ring monitoring system. Attackers can use this vulnerability to obtain sensitive information in the database.
VAR-202002-0477 CVE-2019-19452 Patriot Viper RGB Out-of-bounds write vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A buffer overflow was found in Patriot Viper RGB through 1.1 when processing IoControlCode 0x80102040. Local attackers (including low integrity processes) can exploit this to gain NT AUTHORITY\SYSTEM privileges. Patriot Viper RGB Is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
VAR-202002-1214 CVE-2020-6841 D-Link DCH-M225 On the device OS Command injection vulnerabilities CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
D-Link DCH-M225 1.05b01 and earlier devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the spotifyConnect.php userName parameter. D-Link DCH-M225 On the device OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. DCH-M225 is a Wifi portable audio extender. D-Link DCH-M225 1.05b01 and earlier versions have an arbitrary OS command execution vulnerability
VAR-202002-1215 CVE-2020-6842 D-Link DCH-M225 On the device OS Command injection vulnerabilities CVSS V2: 9.0
CVSS V3: 7.2
Severity: HIGH
D-Link DCH-M225 1.05b01 and earlier devices allow remote authenticated admins to execute arbitrary OS commands via shell metacharacters in the media renderer name. D-Link DCH-M225 On the device OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. DCH-M225 is a Wifi portable audio extender. D-Link DCH-M225 1.05b01 and earlier versions have an arbitrary OS command execution vulnerability
VAR-202002-1113 CVE-2020-5326 Dell Vulnerability in lack of authentication for critical features on client platforms CVSS V2: 2.1
CVSS V3: 5.3
Severity: MEDIUM
Affected Dell Client platforms contain a BIOS Setup configuration authentication bypass vulnerability in the pre-boot Intel Rapid Storage Response Technology (iRST) Manager menu. An attacker with physical access to the system could perform unauthorized changes to the BIOS Setup configuration settings without requiring the BIOS Admin password by selecting the Optimized Defaults option in the pre-boot iRST Manager. Dell A vulnerability exists in the client platform regarding the lack of authentication for critical features.Information may be tampered with
VAR-202002-0603 CVE-2020-1844 PCManager Vulnerability related to authority management in CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
PCManager with versions earlier than 10.0.5.51 have a privilege escalation vulnerability in Huawei PCManager products. An authenticated, local attacker can perform specific operation to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. PCManager Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Huawei PCManager is a set of computer management software developed by China Huawei (Huawei)
VAR-202002-1717 No CVE (Pwn2Own) Samsung Galaxy S10 IndexedDB Use-After-Free Sandbox Escape Vulnerability CVSS V2: -
CVSS V3: 8.4
Severity: HIGH
This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Samsung Galaxy S10. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the IndexedDBDatabase::Close method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and escape the Chromium sandbox.
VAR-202002-1716 No CVE (Pwn2Own) Samsung Galaxy S10 FileWriter Use-After-Free Sandbox Escape Vulnerability CVSS V2: -
CVSS V3: 8.4
Severity: HIGH
This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Samsung Galaxy S10. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of arrays in FileWriterImpl::Write. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and escape the Chromium sandbox.
VAR-202002-1367 CVE-2020-8860 Samsung Galaxy S10 Firmware device Exynos Out-of-bounds write vulnerabilities in chipsets CVSS V2: 5.4
CVSS V3: 8.0
Severity: HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability in that the target must answer a phone call. The specific flaw exists within the Call Control Setup messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the baseband processor. Was ZDI-CAN-9658. Zero Day Initiative To this vulnerability ZDI-CAN-9658 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Samsung Galaxy 10 is a smartphone from Samsung in South Korea. The Call Control Setup message in Samsung Galaxy 10 has a buffer overflow vulnerability. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
VAR-202002-1712 No CVE (Pwn2Own) Samsung Galaxy S10 Out-Of-Bounds Write Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 6.3
Severity: MEDIUM
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of arrays in JSCallReducer::ReduceArrayMap. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process.
VAR-202002-1707 No CVE Omron Automation (China) Co., Ltd. Omron PLC has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Omron PLC is a compact PLC with complete functions that can provide high value-added machine control for industry-leading distributed control of conveying. Omron (China) Co., Ltd. Omron PLC has a denial of service vulnerability. Attackers can use the vulnerability to cause a denial of service.
VAR-202002-1695 No CVE Realtek Semiconductor Co., Ltd. Realtek chip ADSL modem/optical modem serial port has command execution vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Realtek (Realtek) is a supplier of audio and network chips. Realtek Semiconductor Co., Ltd. Realtek chip ADSL modem/optical modem serial port has a command execution vulnerability. Attackers can use this vulnerability to access the backdoor through any IPv4 address of the modem and directly read and write the serial port.
VAR-202002-1698 No CVE The configuration monitoring system of Beijing Jiekong Technology Co., Ltd. has a code execution vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
FameView configuration software is a high-performance configuration monitoring software independently researched and developed by Beijing Jiekong Company with many years of engineering application and service experience, based on the Windows operating system, and provides economical and complete automation solutions. The configuration monitoring system of Beijing Jiekong Technology Co., Ltd. has code execution vulnerabilities. Attackers can use the vulnerabilities to construct malicious links to induce users to analyze and execute arbitrary code in the context of the application.
VAR-202002-1699 No CVE Backdoor vulnerability exists in FameView configuration monitoring system of Beijing Jiekong CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
FameView configuration software is a high-performance configuration monitoring software independently researched and developed by Beijing Jiekong Company with many years of engineering application and service experience, based on the Windows operating system, and provides economical and complete automation solutions. The FameView configuration monitoring system of Beijing Jiekong Company has a backdoor vulnerability. Attackers can use the backdoor password to access the configuration monitoring system on any device of the manufacturer and modify the configuration on the device.
VAR-202002-1682 No CVE Shenzhen Anjubao Electronics Co., Ltd. Marlboze/ Wanbaoze-w30 series cameras have weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Wanbaoze camera software can achieve various hardware alarm effects, allowing you to enjoy a real-time home monitoring experience, so that you can easily understand various situations in the home. Shenzhen Anjubao Electronics Co., Ltd. Marlboze/ Wanbaoze-w30 series cameras have a weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202002-1683 No CVE Shenzhen Anjubao Electronics Co., Ltd. Marlboze/ Wanbaoze-w30 series cameras have command execution vulnerabilities CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
The Wanbaoze camera software can achieve various hardware alarm effects, allowing you to enjoy a real-time home monitoring experience, so that you can easily understand various situations in the home. Shenzhen Anjubao Electronics Co., Ltd. Marlboze/ Wanbaoze-w30 series cameras have a command execution vulnerability. Attackers can use this vulnerability to implement command injection without authorization.
VAR-202003-1594 CVE-2020-6972 Notifier Web Server In Capture-replay Vulnerability related to authentication bypass by CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
In Notifier Web Server (NWS) Version 3.50 and earlier, the Honeywell Fire Web Server’s authentication may be bypassed by a capture-replay attack from a web browser. NOTI? FIRE? NET Web Server is a web-based HTML server that allows you to remotely access the NOTI? FIRE? NET network via the Internet or an intranet. An attacker could use this vulnerability to bypass authentication through a browser capture-replay attack