VARIoT news about IoT security

Trust: 3.25

Fetched: Nov. 23, 2022, 9:50 a.m., Published: Nov. 22, 2022, 8:53 p.m.
Vulnerabilities: code execution, command injection
Affected productsExternal IDs
vendor: asus model: asus
vendor: asus model: bmc firmware
vendor: lenovo model: system

Trust: 3.0

Fetched: Nov. 23, 2022, 9:47 a.m., Published: Nov. 3, 2022, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: apple model: iphone

Trust: 3.0

Fetched: Nov. 23, 2022, 9:47 a.m., Published: June 5, 2022, midnight
Vulnerabilities: buffer overflow
Affected productsExternal IDs

Trust: 4.25

Fetched: Nov. 23, 2022, 9:46 a.m., Published: Nov. 29, 2021, midnight
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: huawei model: huawei

Trust: 4.25

Fetched: Nov. 23, 2022, 9:41 a.m., Published: Nov. 23, 2022, midnight
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: raspberry pi model: raspberry pi 3
vendor: broadcom model: linux

Trust: 3.0

Fetched: Nov. 23, 2022, 9:41 a.m., Published: Oct. 21, 2022, 1:30 a.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: trend model: security

Trust: 3.0

Fetched: Nov. 23, 2022, 9:39 a.m., Published: Nov. 18, 2022, 5:40 p.m.
Vulnerabilities: code execution
Affected productsExternal IDs

Trust: 3.5

Fetched: Nov. 23, 2022, 9:38 a.m., Published: Nov. 14, 2022, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: android
vendor: google model: home
vendor: google model: pixel
db: NVD ids: CVE-2022-20465

Trust: 4.25

Fetched: Nov. 23, 2022, 9:34 a.m., Published: June 21, 2022, 3 a.m.
Vulnerabilities: denial of service, authentication bypass, code execution
Affected productsExternal IDs
vendor: siemens model: wincc oa
vendor: siemens model: wincc
vendor: emerson model: deltav
vendor: emerson model: ovation
vendor: emerson model: deltav distributed control system
vendor: trend model: security
vendor: phoenix model: contact proconos
vendor: honeywell model: experion
vendor: yokogawa model: stardom
vendor: phoenix contact model: proconos
vendor: motorola model: motorola
Related entries in the VARIoT vulnerabilities database: VAR-202202-1278

Trust: 4.25

Fetched: Nov. 23, 2022, 9:31 a.m., Published: Aug. 2, 2022, 1:28 p.m.
Vulnerabilities: configuration vulnerability, buffer overflow, code execution
Affected productsExternal IDs
vendor: cisco model: routers
vendor: cisco model: rv345
vendor: cisco model: series
vendor: cisco model: rv340
vendor: cisco model: series routers
db: NVD ids: CVE-2022-20699

Trust: 3.75

Fetched: Nov. 23, 2022, 9:29 a.m., Published: Aug. 28, 2022, 2:37 p.m.
Vulnerabilities: default password
Affected productsExternal IDs
vendor: forescout model: counteract

Trust: 3.5

Fetched: Nov. 23, 2022, 9:28 a.m., Published: Jan. 7, 2022, 11:32 a.m.
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: apple model: ipad
vendor: apple model: iphone
vendor: apple model: icloud
vendor: google model: home

Trust: 4.25

Fetched: Nov. 23, 2022, 9:25 a.m., Published: -
Vulnerabilities: denial of service, buffer overflow
Affected productsExternal IDs
vendor: jquery model: jquery
vendor: blackberry model: blackberry
vendor: blackberry model: smartphone
vendor: google model: android
vendor: google model: pixel
vendor: apple model: iphone

Trust: 4.25

Fetched: Nov. 23, 2022, 9:24 a.m., Published: -
Vulnerabilities: information exposure, replay attack, buffer overflow
Affected productsExternal IDs
vendor: rockwell automation model: micrologix 1400
vendor: rockwell automation model: 1768-eweb
vendor: rockwell automation model: 1756-eweb
vendor: rockwell automation model: compactlogix
vendor: rockwell automation model: micrologix 1400 firmware
vendor: rockwell automation model: guardlogix controllers
vendor: rockwell automation model: softlogix
vendor: rockwell automation model: 1756-enbt
vendor: rockwell automation model: controllogix
vendor: rockwell automation model: flexlogix
vendor: rockwell automation model: micrologix
vendor: rockwell automation model: micrologix 1100
vendor: rockwell automation model: 1768-enbt
vendor: rockwell automation model: guardlogix
vendor: rockwell automation model: automation controllogix
vendor: rockwell automation model: softlogix controllers
vendor: rockwellautomation model: micrologix 1400
vendor: rockwellautomation model: 1768-eweb
vendor: rockwellautomation model: 1756-eweb
vendor: rockwellautomation model: compactlogix
vendor: rockwellautomation model: micrologix 1400 firmware
vendor: rockwellautomation model: guardlogix controllers
vendor: rockwellautomation model: softlogix
vendor: rockwellautomation model: 1756-enbt
vendor: rockwellautomation model: controllogix
vendor: rockwellautomation model: flexlogix
vendor: rockwellautomation model: micrologix
vendor: rockwellautomation model: micrologix 1100
vendor: rockwellautomation model: 1768-enbt
vendor: rockwellautomation model: guardlogix
vendor: rockwellautomation model: automation controllogix
vendor: rockwellautomation model: softlogix controllers
vendor: rockwell model: micrologix 1400
vendor: rockwell model: 1768-eweb
vendor: rockwell model: 1756-eweb
vendor: rockwell model: compactlogix
vendor: rockwell model: micrologix 1400 firmware
vendor: rockwell model: guardlogix controllers
vendor: rockwell model: softlogix
vendor: rockwell model: 1756-enbt
vendor: rockwell model: controllogix
vendor: rockwell model: flexlogix
vendor: rockwell model: micrologix
vendor: rockwell model: micrologix 1100
vendor: rockwell model: 1768-enbt
vendor: rockwell model: guardlogix
vendor: rockwell model: automation controllogix
vendor: rockwell model: softlogix controllers
db: NVD ids: CVE-2012-6438, CVE-2012-6436, CVE-2012-6442, CVE-2012-6441, CVE-2012-6435, CVE-2012-6437, CVE-2012-6440, CVE-2012-6439

Trust: 3.25

Fetched: Nov. 23, 2022, 9:22 a.m., Published: Nov. 10, 2022, midnight
Vulnerabilities: cross-site scripting, sql injection, system crash
Affected productsExternal IDs
vendor: symantec model: endpoint protection
vendor: symantec model: data loss prevention
vendor: palo model: networks
vendor: check point model: check point
vendor: trend model: security
vendor: trend model: data loss prevention
vendor: trend micro model: security
vendor: trend micro model: data loss prevention
vendor: cisco model: threat response
vendor: palo alto networks model: networks

Trust: 3.25

Fetched: Nov. 23, 2022, 9:20 a.m., Published: -
Vulnerabilities: configuration error
Affected productsExternal IDs

Trust: 3.0

Fetched: Nov. 23, 2022, 9:20 a.m., Published: Nov. 25, 2022, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: home

Trust: 3.25

Fetched: Nov. 23, 2022, 9:14 a.m., Published: Nov. 23, 2023, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: home
vendor: google model: google home
vendor: smarter model: coffee
vendor: trend model: security
vendor: cisco model: routers
vendor: cisco model: meeting

Trust: 3.5

Fetched: Nov. 22, 2022, 9:20 a.m., Published: -
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: android
vendor: google model: pixel
vendor: google model: home
db: NVD ids: CVE-2022-20465

Trust: 3.5

Fetched: Nov. 22, 2022, 9:19 a.m., Published: -
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: android
vendor: google model: pixel
vendor: google model: home
db: NVD ids: CVE-2022-20465