VARIoT news about IoT security

Trust: 3.75

Fetched: Sept. 16, 2024, 7:41 p.m., Published: Sept. 11, 2024, 3:46 p.m.
Vulnerabilities: privilege escalation
Affected productsExternal IDs
vendor: cisco model: cisco ios xr
vendor: cisco model: ios xr
vendor: cisco model: cisco ios
vendor: cisco model: ios xr software
Related entries in the VARIoT vulnerabilities database: VAR-202007-1255, VAR-202109-1682, VAR-202205-1480

Trust: 4.5

Fetched: Sept. 16, 2024, 7:40 p.m., Published: Sept. 4, 2024, 8:59 p.m.
Vulnerabilities: information disclosure
Affected productsExternal IDs
vendor: d-link model: d-link dir-610
vendor: d-link model: dir-605
vendor: d-link model: dir-610
db: NVD ids: CVE-2020-9376, CVE-2021-40655, CVE-2022-28956

Trust: 3.75

Fetched: Sept. 16, 2024, 7:39 p.m., Published: Sept. 13, 2024, 8:35 a.m.
Vulnerabilities: privilege escalation
Affected productsExternal IDs
vendor: cisco model: rv160w
vendor: cisco model: rv340w
vendor: cisco model: rv260p
vendor: cisco model: routers
vendor: cisco model: router
vendor: cisco model: rv345p
vendor: cisco model: rv260
vendor: cisco model: rv340
vendor: cisco model: rv260w

Trust: 4.75

Fetched: Sept. 16, 2024, 7:38 p.m., Published: Sept. 11, 2024, 3:46 p.m.
Vulnerabilities: privilege escalation
Affected productsExternal IDs
vendor: cisco model: rv160w
vendor: cisco model: rv340w
vendor: cisco model: rv260p
vendor: cisco model: routers
vendor: cisco model: router
vendor: cisco model: rv345p
vendor: cisco model: rv260
vendor: cisco model: rv340
vendor: cisco model: rv260w
Related entries in the VARIoT vulnerabilities database: VAR-202409-1026, VAR-202409-1099, VAR-202409-0703

Trust: 6.0

Fetched: Sept. 16, 2024, 7:37 p.m., Published: Sept. 16, 2024, 10:27 a.m.
Vulnerabilities: os command injection, command injection, improper validation...
Affected productsExternal IDs
vendor: d-link model: router
db: NVD ids: CVE-2024-45698, CVE-2024-45696, CVE-2024-45697, CVE-2024-45694, CVE-2024-45695

Trust: 4.25

Fetched: Sept. 16, 2024, 7:36 p.m., Published: Sept. 9, 2024, 4:20 p.m.
Vulnerabilities: path traversal, local file inclusion, file inclusion
Affected productsExternal IDs
vendor: draytek model: vigor
vendor: draytek model: routers
db: NVD ids: CVE-2021-20124, CVE-2021-20123

Trust: 4.75

Fetched: Sept. 16, 2024, 7:35 p.m., Published: Aug. 30, 2024, 6 p.m.
Vulnerabilities: command injection
Affected productsExternal IDs
db: NVD ids: CVE-2024-7120

Trust: 4.5

Fetched: Sept. 16, 2024, 7:35 p.m., Published: Sept. 16, 2024, 11:26 p.m.
Vulnerabilities: command injection, os command injection, code execution
Affected productsExternal IDs
db: NVD ids: CVE-2024-8190

Trust: 3.25

Fetched: Sept. 16, 2024, 7:35 p.m., Published: July 7, 2024, 3:10 a.m.
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2023-45866

Trust: 4.75

Fetched: Sept. 16, 2024, 7:34 p.m., Published: Sept. 16, 2024, 10:01 p.m.
Vulnerabilities: command injection, os command injection
Affected productsExternal IDs
db: NVD ids: CVE-2024-8190

Trust: 4.75

Fetched: Sept. 16, 2024, 7:34 p.m., Published: Sept. 16, 2024, 9:26 a.m.
Vulnerabilities: file execution
Affected productsExternal IDs
vendor: trend model: security
vendor: trend micro model: security
db: NVD ids: CVE-2024-43461

Trust: 5.5

Fetched: Sept. 16, 2024, 7:32 p.m., Published: Sept. 16, 2024, 11:56 a.m.
Vulnerabilities: command injection, privilege escalation, code execution
Affected productsExternal IDs
vendor: check point model: check point
db: NVD ids: CVE-2024-38014, CVE-2024-8253, CVE-2024-8190, CVE-2024-43491, CVE-2024-29847

Trust: 4.0

Fetched: Sept. 16, 2024, 7:32 p.m., Published: Sept. 16, 2024, 2:02 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: check point model: check point
db: NVD ids: CVE-2024-43461

Trust: 3.5

Fetched: Sept. 16, 2024, 7:32 p.m., Published: Sept. 10, 2024, 5:52 p.m.
Vulnerabilities: privilege escalation, information disclosure, security feature bypass...
Affected productsExternal IDs
db: NVD ids: CVE-2024-38217, CVE-2024-38226, CVE-2024-43491, CVE-2024-38014

Trust: 3.75

Fetched: Sept. 16, 2024, 7:30 p.m., Published: May 16, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: essential model: phone

Trust: 3.75

Fetched: Sept. 16, 2024, 7:28 p.m., Published: Sept. 12, 2024, 3:24 p.m.
Vulnerabilities: security feature bypass, code execution, feature bypass
Affected productsExternal IDs
db: NVD ids: CVE-2024-43464, CVE-2024-38249, CVE-2020-17042, CVE-2024-38194, CVE-2024-38014, CVE-2024-38241, CVE-2024-38253, CVE-2024-38063, CVE-2024-38226, CVE-2024-38252, CVE-2024-43491, CVE-2024-38217, CVE-2024-38220, CVE-2024-38242, CVE-2024-38119, CVE-2024-38216, CVE-2024-38018

Trust: 3.75

Fetched: Sept. 16, 2024, 7:28 p.m., Published: Sept. 16, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: essential model: phone

Trust: 3.5

Fetched: Sept. 16, 2024, 7:27 p.m., Published: Sept. 10, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: home
vendor: google model: google home

Trust: 5.0

Fetched: Sept. 16, 2024, 7:27 p.m., Published: Sept. 10, 2024, 11:07 a.m.
Vulnerabilities: improper access control, access control vulnerability
Affected productsExternal IDs
vendor: sonicwall model: sonicos
db: NVD ids: CVE-2024-40766

Trust: 3.25

Fetched: Sept. 16, 2024, 7:25 p.m., Published: Sept. 14, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2024-8190