VARIoT IoT vulnerabilities database
| VAR-202510-2218 | CVE-2025-58071 | F5 BIG-IP IPsec Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: High |
When IPsec is configured on the BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management.
A denial of service vulnerability exists in BIG-IP's IPsec module. An attacker could exploit this vulnerability to cause a denial of service on the BIG-IP system, disrupting traffic flow and restarting the TMM process
| VAR-202510-2092 | CVE-2025-61974 | F5 BIG-IP SSL/TLS Profile Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: High |
When a client SSL profile is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management.
The SSL/TLS module in BIG-IP contains a denial of service vulnerability. An attacker could exploit this vulnerability to degrade system performance, potentially leading to a denial of service
| VAR-202510-0885 | CVE-2025-61958 | F5 BIG-IP iHealth tool permission bypass vulnerability |
CVSS V2: 9.4 CVSS V3: 8.7 Severity: High |
A vulnerability exists in the iHealth command that may allow an authenticated attacker with at least a resource administrator role to bypass tmsh restrictions and gain access to a bash shell. For BIG-IP systems running in Appliance mode, a successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management.
A privilege bypass vulnerability exists in BIG-IP's iHealth tool (a module of the TMOS Shell)
| VAR-202510-1592 | CVE-2025-60016 | F5 BIG-IP SSL/TLS Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: High |
When Diffie-Hellman (DH) group Elliptic Curve Cryptography (ECC) Brainpool curves are configured in an SSL profile's Cipher Rule or Cipher Group, and that profile is applied to a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management.
A denial of service vulnerability exists in the BIG-IP SSL/TLS module. Undisclosed traffic can cause the Traffic Management Microkernel (TMM) process to terminate. An attacker could exploit this vulnerability to launch a denial of service attack against the BIG-IP system
| VAR-202510-1083 | CVE-2025-59481 | F5 BIG-IP Privilege Escalation Vulnerability |
CVSS V2: 9.4 CVSS V3: 8.7 Severity: High |
A vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with at least resource administrator role to execute arbitrary system commands with higher privileges. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management.
A privilege escalation vulnerability exists in BIG-IP's iControl REST and TMOS Shell (tmsh) modules
| VAR-202510-2219 | CVE-2025-58424 | F5 BIG-IP TMM data tampering vulnerability |
CVSS V2: 2.6 CVSS V3: 3.7 Severity: Medium |
On BIG-IP systems, undisclosed traffic can cause data corruption and unauthorized data modification in protocols which do not have message integrity protection. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management.
The TMM module in BIG-IP contains a data tampering vulnerability
| VAR-202510-0756 | CVE-2025-58096 | F5 BIG-IP TMM Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: High |
When the database variable tm.tcpudptxchecksum is configured as non-default value Software-only on a BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management.
A denial of service vulnerability exists in the Traffic Management Microkernel (TMM) module of BIG-IP. An attacker could exploit this vulnerability to launch a denial of service (DoS) attack against the BIG-IP system
| VAR-202510-1106 | CVE-2025-55036 | F5 BIG-IP SSL Orchestrator Memory Corruption Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: High |
When BIG-IP SSL Orchestrator explicit forward proxy is configured on a virtual server and the proxy connect feature is enabled, undisclosed traffic may cause memory corruption. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. An attacker could exploit this vulnerability to cause system performance degradation, ultimately forcing or manually restarting the Traffic Management Microkernel (TMM) process, resulting in a denial of service (DoS)
| VAR-202510-1108 | CVE-2025-54805 | F5 BIG-IP Next TMM Memory Resource Management Vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: Medium |
When an iRule is configured on a virtual server via the declarative API, upon re-instantiation, the cleanup process can cause an increase in the Traffic Management Microkernel (TMM) memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management.
The TMM module in BIG-IP Next contains a memory resource management vulnerability. An attacker could exploit this vulnerability to degrade system performance and potentially cause a denial of service
| VAR-202510-0946 | CVE-2025-53856 | F5 BIG-IP ePVA Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: High |
When a virtual server, network address translation (NAT) object, or secure network address translation (SNAT) object uses the embedded Packet Velocity Acceleration (ePVA) feature, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. To determine which BIG-IP platforms have an ePVA chip refer to K12837: Overview of the ePVA feature https://my.f5.com/manage/s/article/K12837 . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, and remote access policy management.
A denial of service vulnerability exists in BIG-IP's ePVA module. An attacker could exploit this vulnerability to cause a denial of service on the BIG-IP system
| VAR-202510-3116 | CVE-2025-55315 |
CVSS V2: - CVSS V3: 9.9 Severity: CRITICAL |
Inconsistent interpretation of http requests ('http request/response smuggling') in ASP.NET Core allows an authorized attacker to bypass a security feature over a network.
| VAR-202510-0661 | CVE-2024-47569 |
CVSS V2: - CVSS V3: 4.3 Severity: MEDIUM |
A insertion of sensitive information into sent data in Fortinet FortiManager Cloud 7.4.1 through 7.4.3, FortiVoice 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.7 through 6.0.12, FortiMail 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.9, FortiOS 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, 6.0.0 through 6.0.18, FortiWeb 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11, 6.4.0 through 6.4.3, FortiRecorder 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiNDR 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.5, 7.1.0 through 7.1.1, 7.0.0 through 7.0.7, 1.5.0 through 1.5.3, FortiPAM 1.3.0 through 1.3.1, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiTester 7.4.0 through 7.4.2, 7.3.0 through 7.3.2, 7.2.0 through 7.2.3, 7.1.0 through 7.1.1, 7.0.0, 4.2.0 through 4.2.1, FortiProxy 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.21, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager 7.6.0 through 7.6.1, 7.4.1 through 7.4.3 allows attacker to disclose sensitive information via specially crafted packets.
| VAR-202510-1123 | CVE-2025-47856 |
CVSS V2: - CVSS V3: 7.2 Severity: HIGH |
Two improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiVoice version 7.2.0, 7.0.0 through 7.0.6 and before 6.4.10 allows a privileged attacker to execute arbitrary code or commands via crafted HTTP/HTTPS or CLI requests.
| VAR-202510-0874 | CVE-2025-9178 | Rockwell Automation 1715-AENTR EtherNet/IP Adapter Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: High |
A denial-of-service security issue exists in the affected product and version. The security issue is caused through CIP communication using crafted payloads. The security issue could result in no CIP communication with 1715 EtherNet/IP Adapter.A restart is required to recover. The Rockwell Automation 1715-AENTR EtherNet/IP Adapter is a redundant Ethernet adapter module from Rockwell Automation.
The Rockwell Automation 1715-AENTR EtherNet/IP Adapter has a denial of service vulnerability due to improper processing of specially crafted payloads in CIP communications. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202510-2220 | CVE-2025-9177 | Rockwell Automation 1715-AENTR EtherNet/IP Adapter Denial of Service Vulnerability (CNVD-2025-24581) |
CVSS V2: 7.8 CVSS V3: - Severity: High |
A denial-of-service security issue exists in the affected product and version. The security issue stems from a high number of requests sent to the web server. This could result in a web server crash however; this does not impact I/O control or communication . A power cycle is required to recover and utilize the webpage. The Rockwell Automation 1715-AENTR EtherNet/IP Adapter is a redundant Ethernet adapter module manufactured by Rockwell Automation.
The Rockwell Automation 1715-AENTR EtherNet/IP Adapter contains a denial of service vulnerability that could allow an attacker to crash the web server
| VAR-202510-2627 | CVE-2025-9068 |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
A security issue exists within the Rockwell Automation Driver Package x64 Microsoft Installer File (MSI) repair functionality, installed with FTLinx. Authenticated attackers with valid Windows Users credentials can initiate a repair and hijack the resulting console window for vbpinstall.exe. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.
| VAR-202510-1221 | CVE-2025-9067 |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
A security issue exists within the x86 Microsoft Installer File (MSI), installed with FTLinx. Authenticated attackers with valid Windows user credentials can initiate a repair and hijack the resulting console window. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.
| VAR-202510-1230 | CVE-2025-7330 | Rockwell Automation Comms-1783-NATR Cross-Site Request Forgery Vulnerability |
CVSS V2: 7.1 CVSS V3: 6.5 Severity: MEDIUM |
A cross-site request forgery security issue exists in the product and version listed. The vulnerability stems from missing CSRF checks on the impacted form. This allows for unintended configuration modification if an attacker can convince a logged in admin to visit a crafted link. The Rockwell Automation Comms-1783-NATR is an industrial Ethernet address translation device from Rockwell Automation
| VAR-202510-0712 | CVE-2025-7329 | Rockwell Automation Comms-1783-NATR Cross-Site Scripting Vulnerability |
CVSS V2: 8.3 CVSS V3: 4.8 Severity: MEDIUM |
A Stored Cross-Site Scripting security issue exists in the affected product that could potentially allow a malicious user to view and modify sensitive data or make the webpage unavailable. The vulnerability stems from missing special character filtering and encoding. Successful exploitation requires an attacker to be able to update configuration fields behind admin login. The Rockwell Automation Comms-1783-NATR is an industrial Ethernet address translation device from Rockwell Automation.
The Rockwell Automation Comms-1783-NATR suffers from a cross-site scripting vulnerability caused by improper validation of user-supplied input
| VAR-202510-1054 | CVE-2025-7328 | Rockwell Automation Comm-1783-NATR has an unspecified vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Multiple Broken Authentication security issues exist in the affected product. The security issues are due to missing authentication checks on critical functions. These could result in potential denial-of-service, admin account takeover, or NAT rule modifications. Devices would no longer be able to communicate through NATR as a result of denial-of-service or NAT rule modifications. NAT rule modification could also result in device communication to incorrect endpoints. Admin account takeover could allow modification of configuration and require physical access to restore. The Rockwell Automation Comms-1783-NATR is an industrial Ethernet address translation device from Rockwell Automation