VARIoT news about IoT security

Trust: 3.0

Fetched: Dec. 15, 2024, 9:27 a.m., Published: Dec. 14, 2024, 1:20 p.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2024-45722

Trust: 3.5

Fetched: Dec. 15, 2024, 9:26 a.m., Published: Nov. 15, 2024, 2:15 p.m.
Vulnerabilities: default password
Affected productsExternal IDs
vendor: axis model: axis
vendor: canary model: canary

Trust: 3.75

Fetched: Dec. 15, 2024, 9:25 a.m., Published: Oct. 29, 2024, 1:15 a.m.
Vulnerabilities: buffer overflow
Affected productsExternal IDs
db: NVD ids: CVE-2024-50080

Trust: 4.0

Fetched: Dec. 15, 2024, 9:24 a.m., Published: Dec. 2, 2024, midnight
Vulnerabilities: cross-site scripting
Affected productsExternal IDs

Trust: 4.0

Fetched: Dec. 15, 2024, 9:24 a.m., Published: Nov. 12, 2024, 5:26 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: essential model: phone
db: NVD ids: CVE-2024-34679

Trust: 4.75

Fetched: Dec. 15, 2024, 9:23 a.m., Published: Dec. 1, 2024, midnight
Vulnerabilities: command execution
Affected productsExternal IDs
vendor: synology model: diskstation
db: NVD ids: CVE-2024-10443

Trust: 5.25

Fetched: Dec. 15, 2024, 9:23 a.m., Published: Nov. 18, 2024, 9:15 a.m.
Vulnerabilities: configuration vulnerability
Affected productsExternal IDs
db: NVD ids: CVE-2024-41967

Trust: 5.0

Fetched: Dec. 15, 2024, 9:22 a.m., Published: Dec. 10, 2024, 5:04 p.m.
Vulnerabilities: code execution
Affected productsExternal IDs
db: NVD ids: CVE-2024-50623

Trust: 5.25

Fetched: Dec. 15, 2024, 9:21 a.m., Published: Dec. 2, 2024, midnight
Vulnerabilities: buffer overflow, code execution
Affected productsExternal IDs
vendor: sonicwall model: sma 100
vendor: sonicwall model: ssl vpn
vendor: sonicwall model: sma1000
vendor: sonicwall model: sma100
db: NVD ids: CVE-2024-53702, CVE-2024-53703, CVE-2024-38475, CVE-2024-45318, CVE-2024-45319, CVE-2024-40763
Related entries in the VARIoT vulnerabilities database: VAR-202411-0293, VAR-202411-1034

Trust: 5.5

Fetched: Dec. 15, 2024, 9:20 a.m., Published: Nov. 15, 2024, 7:06 a.m.
Vulnerabilities: privilege escalation, code execution, command injection
Affected productsExternal IDs
vendor: cisco model: access points
vendor: epson model: connect
db: NVD ids: CVE-2024-49039, CVE-2024-43451, CVE-2024-10914, CVE-2024-39205, CVE-2024-11068, CVE-2024-8069, CVE-2024-50340, CVE-2024-47295, CVE-2024-49040, CVE-2024-42509, CVE-2024-8068, CVE-2023-38408, CVE-2024-40711, CVE-2024-20418, CVE-2024-47460
Related entries in the VARIoT vulnerabilities database: VAR-202412-0442

Trust: 5.0

Fetched: Dec. 15, 2024, 9:18 a.m., Published: Dec. 1, 2024, midnight
Vulnerabilities: cross-site request forgery, request forgery
Affected productsExternal IDs
db: NVD ids: CVE-2020-28398

Trust: 3.25

Fetched: Dec. 13, 2024, 10:02 a.m., Published: Dec. 10, 2024, 11:03 p.m.
Vulnerabilities: denial of service, buffer overflow, sql injection
Affected productsExternal IDs
vendor: cisco model: series
vendor: cisco model: security manager
vendor: cisco model: asdm
vendor: cisco model: cisco ios
vendor: cisco model: cisco nac appliance
vendor: cisco model: soho
vendor: cisco model: routers
vendor: cisco model: cisco security manager
vendor: cisco model: guard
vendor: cisco model: intrusion prevention system
vendor: cisco model: clientless ssl vpn
vendor: cisco model: nac appliance
vendor: cisco model: vpn client
vendor: cisco model: router
vendor: cisco model: asa 5506-x
vendor: cisco model: adaptive security appliance
vendor: mesh model: mesh
vendor: snort model: snort

Trust: 5.75

Fetched: Dec. 13, 2024, 10:01 a.m., Published: Dec. 11, 2024, 2:57 p.m.
Vulnerabilities: sql injection
Affected productsExternal IDs
vendor: sophos model: firewall
db: NVD ids: CVE-2020-12271

Trust: 5.5

Fetched: Dec. 13, 2024, 10:01 a.m., Published: Nov. 15, 2024, 12:39 p.m.
Vulnerabilities: privilege escalation, directory traversal, command injection...
Affected productsExternal IDs
vendor: palo model: pan-os
vendor: palo model: firewall
vendor: palo model: networks
vendor: palo alto networks model: pan-os
vendor: palo alto networks model: firewall
vendor: palo alto networks model: networks
db: NVD ids: CVE-2024-5910, CVE-2024-51567, CVE-2019-16278, CVE-2024-9465, CVE-2024-9463, CVE-2024-43093
Related entries in the VARIoT vulnerabilities database: VAR-202205-0394, VAR-202209-1931, VAR-202212-1132, VAR-202112-0566

Trust: 4.75

Fetched: Dec. 13, 2024, 10 a.m., Published: Dec. 12, 2024, 8:30 p.m.
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: palo model: firewall
vendor: palo model: networks
vendor: cisco model: routers
vendor: cisco model: hyperflex
vendor: cisco model: nx-os
vendor: sophos model: xg firewall
vendor: sophos model: firewall
db: NVD ids: CVE-2021-1497, CVE-2024-21893, CVE-2022-1388, CVE-2020-29574, CVE-2020-15069, CVE-2022-1040, CVE-2024-21887, CVE-2022-3236, CVE-2023-46805, CVE-2022-42475, CVE-2021-44228, CVE-2023-3519, CVE-2024-20399, CVE-2020-12271, CVE-2024-21888, CVE-2019-19781, CVE-2019-11510

Trust: 3.5

Fetched: Dec. 13, 2024, 10 a.m., Published: Dec. 13, 2024, midnight
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: essential model: phone
vendor: apple model: iphone
vendor: apple model: icloud

Trust: 4.25

Fetched: Dec. 13, 2024, 9:59 a.m., Published: May 28, 2024, 1:08 p.m.
Vulnerabilities: denial of service, sql injection
Affected productsExternal IDs
vendor: tesla model: model

Trust: 3.5

Fetched: Dec. 13, 2024, 9:58 a.m., Published: Nov. 9, 2023, 6:41 a.m.
Vulnerabilities: data injection, request forgery, code execution...
Affected productsExternal IDs
vendor: google model: home

Trust: 4.75

Fetched: Dec. 13, 2024, 9:57 a.m., Published: Dec. 10, 2024, 6:20 p.m.
Vulnerabilities: information disclosure, privilege elevation, code execution...
Affected productsExternal IDs
db: NVD ids: CVE-2024-49097, CVE-2024-49132, CVE-2024-49138, CVE-2024-49059, CVE-2024-49116, CVE-2024-49108, CVE-2024-49084, CVE-2024-49095, CVE-2024-49098, CVE-2024-43594, CVE-2024-49101, CVE-2024-49068, CVE-2024-49082, CVE-2024-49073, CVE-2024-49079, CVE-2024-49064, CVE-2024-49115, CVE-2024-49070, CVE-2024-49102, CVE-2024-49090, CVE-2024-49076, CVE-2024-49119, CVE-2024-49110, CVE-2024-49088, CVE-2024-49069, CVE-2024-49125, CVE-2024-49128, CVE-2024-49106, CVE-2024-49087, CVE-2024-49127, CVE-2024-49093, CVE-2024-49104, CVE-2024-49113, CVE-2024-49077, CVE-2024-49094, CVE-2024-49120, CVE-2024-49057, CVE-2024-49142, CVE-2024-49078, CVE-2024-49123, CVE-2024-49111, CVE-2024-49109, CVE-2024-49107, CVE-2024-12053, CVE-2024-49112, CVE-2024-49081, CVE-2024-49124, CVE-2024-49122, CVE-2024-49083, CVE-2024-49118, CVE-2024-49126, CVE-2024-49074, CVE-2024-49091, CVE-2024-49089, CVE-2024-49062, CVE-2024-49072, CVE-2024-49103, CVE-2024-49099, CVE-2024-49063, CVE-2024-49129, CVE-2024-49041, CVE-2024-49114, CVE-2024-49065, CVE-2024-49096, CVE-2024-43600, CVE-2024-49080, CVE-2024-49085, CVE-2024-49086, CVE-2024-49117, CVE-2024-49121, CVE-2024-49092, CVE-2024-49075

Trust: 4.75

Fetched: Dec. 13, 2024, 9:57 a.m., Published: Dec. 5, 2024, midnight
Vulnerabilities: code execution, weak password, password recovery bug...
Affected productsExternal IDs
db: NVD ids: CVE-2024-48874, CVE-2024-52324, CVE-2024-47547