VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202406-0066 CVE-2024-35208 Siemens'  sinec traffic analyzer  Vulnerability regarding insufficient protection of authentication information in CVSS V2: 4.3
CVSS V3: 5.5
Severity: MEDIUM
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server stored the password in cleartext. This could allow attacker in a privileged position to obtain access passwords. SINEC Traffic Analyzer is an on-premises application that monitors PNIO (PROFINET IO) communication between controllers and IO devices. The software detects PROFINET communication problems and reports them to the user via the Web-UI. Siemens SINEC Traffic Analyzer has an insufficient credential protection vulnerability, which is caused by the web server storing passwords in plain text, which can be exploited by attackers to obtain access passwords
VAR-202406-0060 CVE-2024-35207 Siemens'  sinec traffic analyzer  Cross-site request forgery vulnerability in CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery(CSRF) attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user. Siemens' sinec traffic analyzer Contains a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SINEC Traffic Analyzer is an on-premises application that monitors PNIO (PROFINET IO) communication between controllers and IO devices. The software detects PROFINET communication problems and reports them to the user via the Web-UI
VAR-202406-0061 CVE-2024-35206 Siemens'  sinec traffic analyzer  Session deadline vulnerability in CVSS V2: 7.2
CVSS V3: 8.8
Severity: HIGH
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected application does not expire the session. This could allow an attacker to get unauthorized access. Siemens' sinec traffic analyzer contains a session expiration vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SINEC Traffic Analyzer is an on-premises application that monitors PNIO (PROFINET IO) communication between controllers and IO devices. The software detects PROFINET communication problems and reports them to the user via the Web-UI
VAR-202406-0042 CVE-2023-50763 Siemens TIM 1531 IRC infinite loop vulnerability CVSS V2: 6.8
CVSS V3: 4.9
Severity: MEDIUM
A vulnerability has been identified in SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.4.8), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.4.8). The web server of affected products, if configured to allow the import of PKCS12 containers, could end up in an infinite loop when processing incomplete certificate chains. This could allow an authenticated remote attacker to create a denial of service condition by importing specially crafted PKCS12 containers. TIM 1531 IRC is a communication module for SIMATIC S7-1500, S7-400, S7-300
VAR-202406-0184 CVE-2023-38533 Siemens TIA Administrator Arbitrary File Write Vulnerability CVSS V2: 1.7
CVSS V3: 3.3
Severity: LOW
A vulnerability has been identified in TIA Administrator (All versions < V3 SP2). The affected component creates temporary download files in a directory with insecure permissions. This could allow any authenticated attacker on Windows to disrupt the update process. TIA Administrator is a web-based framework that can merge different functional modules to complete management tasks and manage SIMATIC software and license functions
VAR-202406-0183 CVE-2024-36266 Siemens PowerSys Authentication Error Vulnerability CVSS V2: 7.2
CVSS V3: 9.3
Severity: CRITICAL
A vulnerability has been identified in PowerSys (All versions < V3.11). The affected application insufficiently protects responses to authentication requests. This could allow a local attacker to bypass authentication, thereby gaining administrative privileges for the managed remote devices. PowerSys is a service program used for debugging, maintenance and diagnosis of PowerLink 50/100 or SWT 3000 devices
VAR-202406-2616 CVE-2024-36788 of netgear  WNR614  Firmware vulnerabilities CVSS V2: -
CVSS V3: 4.8
Severity: MEDIUM
Netgear WNR614 JNR1010V2 N300-V1.1.0.54_1.0.1 does not properly set the HTTPOnly flag for cookies. This allows attackers to possibly intercept and access sensitive communications between the router and connected devices. of netgear WNR614 There are unspecified vulnerabilities in the firmware.Information may be obtained and information may be tampered with
VAR-202406-2715 CVE-2023-37539 HCL Technologies Limited  of  Domino server  Cross-site scripting vulnerability in CVSS V2: -
CVSS V3: 5.4
Severity: MEDIUM
The Domino Catalog template is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability. An attacker with the ability to edit documents in the catalog application/database created from this template can embed a cross site scripting attack. The attack would be activated by an end user clicking it. HCL Technologies Limited of Domino server Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
VAR-202406-0123 CVE-2024-36359 Trend Micro InterScan Web Security Virtual Appliance Cross-Site Scripting Privilege Escalation Vulnerability CVSS V2: 5.5
CVSS V3: 5.4
Severity: MEDIUM
A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 could allow an attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Authentication is required to exploit this vulnerability.The specific flaw exists within the HTTP Inspection component. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user
VAR-202406-0101 CVE-2024-32849 Trend Micro Maximum Security coreServiceShell Link Following Local Privilege Escalation Vulnerability CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
Trend Micro Security 17.x (Consumer) is vulnerable to a Privilege Escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the coreServiceShell. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM
VAR-202406-2711 CVE-2023-43555 Out-of-bounds read vulnerability in multiple Qualcomm products CVSS V2: -
CVSS V3: 8.2
Severity: HIGH
Information disclosure in Video while parsing mp2 clip with invalid section length. AQT1000 firmware, fastconnect 6200 firmware, fastconnect 6700 Multiple Qualcomm products, such as firmware, contain an out-of-bounds read vulnerability.Information may be obtained
VAR-202406-2297 CVE-2023-43551 Authentication vulnerabilities in multiple Qualcomm products CVSS V2: -
CVSS V3: 9.1
Severity: CRITICAL
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command. 315 5g iot modem firmware, 9205 lte modem firmware, 9206 lte modem Multiple Qualcomm products, such as firmware, contain vulnerabilities related to authentication.Information may be tampered with
VAR-202406-1374 No CVE Raisecom iSDC of Raisecom Technology Development Co., Ltd. has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Raisecom Technology Development Co., Ltd. is a provider of optical network products and system solutions. Raisecom iSDC of Raisecom Technology Development Co., Ltd. has a command execution vulnerability, which can be exploited by attackers to obtain server permissions.
VAR-202405-1919 CVE-2024-24946 AutomationDirect P3-550E Out-of-Bounds Write Vulnerability CVSS V2: 8.5
CVSS V3: 8.2
Severity: HIGH
A heap-based buffer overflow vulnerability exists in the Programming Software Connection CurrDir functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger these vulnerability.This CVE tracks the heap corruption that occurs at offset `0xb686c` of version 1.2.10.9 of the P3-550E firmware, which occurs when a call to `memset` relies on an attacker-controlled length value and corrupts any trailing heap allocations. AutomationDirect P3-550E is a programmable control system (PLC) of AutomationDirect, Inc., USA
VAR-202405-2022 CVE-2024-23315 AutomationDirect P3-550E Access Control Error Vulnerability (CNVD-2024-34888) CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A read-what-where vulnerability exists in the Programming Software Connection IMM 01A1 Memory Read functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to a disclosure of sensitive information. An attacker can send an unauthenticated packet to trigger this vulnerability. AutomationDirect P3-550E is a programmable control system (PLC) of AutomationDirect, Inc. of the United States
VAR-202405-1997 CVE-2024-22187 AutomationDirect P3-550E Access Control Error Vulnerability CVSS V2: 9.4
CVSS V3: 9.1
Severity: CRITICAL
A write-what-where vulnerability exists in the Programming Software Connection Remote Memory Diagnostics functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to an arbitrary write. An attacker can send an unauthenticated packet to trigger this vulnerability. AutomationDirect P3-550E is a programmable control system (PLC) of AutomationDirect, Inc. of the United States
VAR-202405-3276 CVE-2024-35399 TOTOLINK CP900L loginAuth function buffer overflow vulnerability CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a stack overflow via the password parameter in the function loginAuth. TOTOLINK CP900L is a wireless router from China's TOTOLINK Electronics. There is a buffer overflow vulnerability in the TOTOLINK CP900L v4.1.5cu.798_B20221228 version. The vulnerability is caused by the password parameter of the loginAuth function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202405-3277 CVE-2024-35397 TOTOLINK CP900L NTPSyncWithHost function command injection vulnerability CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
TOTOLINK CP900L v4.1.5cu.798_B20221228 weas discovered to contain a command injection vulnerability in the NTPSyncWithHost function via the hostTime parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. TOTOLINK CP900L is a wireless router from China's TOTOLINK Electronics
VAR-202405-2633 No CVE HP DesignJet T730 of HP Trading (Shanghai) Co., Ltd. has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
HP DesignJet T730 is a printer. HP DesignJet T730 of HP Trading (Shanghai) Co., Ltd. has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202405-3466 CVE-2024-35388 TOTOLINK NR1800X Buffer Overflow Vulnerability (CNVD-2024-34380) CVSS V2: 10.0
CVSS V3: 8.8
Severity: HIGH
TOTOLINK NR1800X v9.1.0u.6681_B20230703 was discovered to contain a stack overflow via the password parameter in the function urldecode. TOTOLINK NR1800X is a 5G NR indoor Wi-Fi and SIP CPE from China's TOTOLINK Electronics. It is designed to provide fast and convenient NR fixed data service deployment for homes and offices. TOTOLINK NR1800X v9.1.0u.6681_B20230703 version has a buffer overflow vulnerability. The vulnerability is caused by the password parameter in the urldecode function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service