VARIoT IoT vulnerabilities database
VAR-202412-0834 | No CVE | Siemens SIMATIC PCS neo Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
SIMATIC PCS neo is a fully web-based process control system.
Siemens SIMATIC PCS neo has a buffer overflow vulnerability that can be exploited by unauthenticated remote attackers to execute arbitrary code.
VAR-202412-3098 | No CVE | Siemens SINEC NMS Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
SINEC NMS is a network management system (NMS) that can scale to handle network structures of all sizes in an increasingly digital world. The system can be used to centrally monitor, manage and configure industrial networks covering tens of thousands of devices around the clock, including safety-related areas.
A buffer overflow vulnerability exists in Siemens SINEC NMS that can be exploited by an unauthenticated remote attacker to execute arbitrary code.
VAR-202412-0457 | CVE-2024-53832 | Siemens SICAM A8000 CP-8031 and CP-8050 Firmware Decryption Vulnerability |
CVSS V2: 6.1 CVSS V3: 4.6 Severity: Medium |
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V05.30). The affected devices contain a secure element which is connected via an unencrypted SPI bus. This could allow an attacker with physical access to the SPI bus to observe the password used for the secure element authentication, and then use the secure element as an oracle to decrypt all encrypted update files. SICAM A8000 RTU (Remote Terminal Unit) is a modular device for remote control and automation applications in all energy supply sectors
VAR-202412-0349 | CVE-2024-53242 | Siemens Tecnomatix Plant Simulation WRL File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability |
CVSS V2: 6.0 CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.
This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25206). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files in the wrltojt module. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production throughput and improve manufacturing system performance
VAR-202412-0348 | CVE-2024-53041 | Siemens Tecnomatix Plant Simulation WRL File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: - CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain a stack based overflow vulnerability while parsing specially crafted WRL files.
This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25000). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files in the wrltojt module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer
VAR-202412-0387 | CVE-2024-52051 | Siemens Engineering Platforms Local Arbitrary Code Execution Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.3 Severity: High |
A vulnerability has been identified in SIMATIC S7-PLCSIM V17 (All versions), SIMATIC S7-PLCSIM V18 (All versions), SIMATIC STEP 7 Safety V17 (All versions), SIMATIC STEP 7 Safety V18 (All versions), SIMATIC STEP 7 Safety V19 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions), SIMATIC WinCC Unified PC Runtime V18 (All versions), SIMATIC WinCC Unified PC Runtime V19 (All versions), SIMATIC WinCC Unified V17 (All versions), SIMATIC WinCC Unified V18 (All versions), SIMATIC WinCC Unified V19 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SIMOTION SCOUT TIA V5.6 SP1 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions). The affected devices do not properly sanitize user-controllable input when parsing user settings. This could allow an attacker to locally execute arbitrary commands in the host operating system with the privileges of the user. Totally Integrated Automation Portal (TIA Portal) is a PC software that provides the full range of Siemens digital automation services, from digital planning, integrated engineering to transparent operation
VAR-202412-0388 | CVE-2024-49849 | Siemens Engineering Platforms Deserialization Vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: High |
A vulnerability has been identified in SIMATIC S7-PLCSIM V16 (All versions), SIMATIC S7-PLCSIM V17 (All versions), SIMATIC STEP 7 Safety V16 (All versions), SIMATIC STEP 7 Safety V17 (All versions), SIMATIC STEP 7 Safety V18 (All versions), SIMATIC STEP 7 Safety V19 (All versions), SIMATIC STEP 7 V16 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions), SIMATIC WinCC Unified V16 (All versions), SIMATIC WinCC Unified V17 (All versions), SIMATIC WinCC Unified V18 (All versions), SIMATIC WinCC Unified V19 (All versions), SIMATIC WinCC V16 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions), SIMOCODE ES V16 (All versions), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOTION SCOUT TIA V5.4 SP1 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SIMOTION SCOUT TIA V5.6 SP1 (All versions), SINAMICS Startdrive V16 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), TIA Portal Cloud V16 (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions). Affected products do not properly sanitize user-controllable input when parsing log files. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application. SIMATIC S7-PLCSIM simulates S7-1200, S7-1500 and some other PLC derivatives and is shipped as part of SIMATIC STEP 7. SIMATIC STEP 7 (TIA Portal) is an engineering software for configuring and programming SIMATIC controllers. SIMOCODE ES is the central software package for configuration, commissioning, operation and diagnostics of SIMOCODE-pro. SINAMICS Startdrive commissioning software is the engineering tool for integrating SINAMICS drives in TIA Portal. Totally Integrated Automation Portal (TIA Portal) is a PC software that offers the complete range of Siemens digital automation services, from digital planning and integrated engineering to transparent operation. TIA Portal Cloud makes it possible to use the main and main option packages of TIA Portal in a virtualized environment. Local projects can be transferred to the cloud and reloaded via file sharing services
VAR-202412-0442 | CVE-2020-28398 | Siemens RUGGEDCOM ROX II Cross-Site Request Forgery Vulnerability |
CVSS V2: 10.0 CVSS V3: 8.8 Severity: High |
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). The CLI feature in the web interface of affected devices is vulnerable to
cross-site request forgery (CSRF).
This could allow an attacker to read or modify the device configuration
by tricking an authenticated legitimate user into accessing a malicious link. RUGGEDCOM ROX II is a ROX-based VPN endpoint and firewall device used to connect devices operating in harsh environments, such as power substations and traffic control cabinets
VAR-202412-0464 | CVE-2024-12344 | TP-LINK Technologies of vn020 f3v Out-of-bounds write vulnerability in firmware |
CVSS V2: 6.5 CVSS V3: 6.3 Severity: Medium |
A vulnerability, which was classified as critical, was found in TP-Link VN020 F3v(T) TT_V6.2.1021. This affects an unknown part of the component FTP USER Command Handler. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. TP-LINK Technologies of vn020 f3v An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK VN020 is a wireless modem from TP-LINK of China. Unauthenticated attackers can exploit this vulnerability to execute arbitrary code
VAR-202412-0376 | CVE-2024-12343 | TP-LINK Technologies of vn020 f3v Buffer error vulnerability in firmware |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: High |
A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. TP-LINK Technologies of vn020 f3v The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK VN020 is a wireless modem from TP-LINK of China
VAR-202412-2040 | CVE-2024-51551 | ABB ASPECT has an unspecified vulnerability (CNVD-2024-49518) |
CVSS V2: 10.0 CVSS V3: 10.0 Severity: Critical |
Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials.
Affected products:
ABB ASPECT - Enterprise v3.07.02;
NEXUS Series v3.07.02;
MATRIX Series v3.07.02. ABB ASPECT is a scalable building energy management and control solution from Swiss company ABB. Attackers can exploit this vulnerability to access the system
VAR-202412-2234 | CVE-2024-48845 | ABB ASPECT has an unspecified vulnerability |
CVSS V2: 9.7 CVSS V3: 9.4 Severity: Critical |
Weak Password Reset Rules vulnerabilities where found providing a potiential for the storage of weak passwords that could facilitate unauthorized admin/application access.
Affected products:
ABB ASPECT - Enterprise v3.07.02;
NEXUS Series v3.07.02;
MATRIX Series v3.07.02. ABB ASPECT is a scalable building energy management and control solution from Swiss company ABB. An attacker can exploit this vulnerability to gain unauthorized administrator/application access
VAR-202412-1816 | CVE-2018-9399 | Google of Android Out-of-bounds write vulnerability in |
CVSS V2: 6.8 CVSS V3: 6.7 Severity: MEDIUM |
In /proc/driver/wmt_dbg driver, there are several possible out of bounds
writes. These could lead to local escalation of privilege with System
execution privileges needed. User interaction is not needed for
exploitation. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google Inc.
There is a security vulnerability in Google Pixel, which is caused by multiple possible out-of-bounds writes in the /proc/driver/wmt_dbg driver. No detailed vulnerability details are provided at this time
VAR-202412-0654 | No CVE | There is a SQL injection vulnerability in the Aikuai flow control router of Quanxun Huiju Network Technology (Beijing) Co., Ltd. |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
AiKuai flow control router is a router product of Quanxun Huiju Network Technology (Beijing) Co., Ltd.
AiKuai flow control router of Quanxun Huiju Network Technology (Beijing) Co., Ltd. has a SQL injection vulnerability, which can be exploited by attackers to obtain sensitive information from the database.
VAR-202412-1003 | No CVE | The AiKuai flow control router of Quanxun Huiju Network Technology (Beijing) Co., Ltd. has an information leakage vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
AiKuai flow control router is a router product of Quanxun Huiju Network Technology (Beijing) Co., Ltd.
AiKuai flow control router of Quanxun Huiju Network Technology (Beijing) Co., Ltd. has an information leakage vulnerability, which can be exploited by attackers to obtain sensitive information.
VAR-202412-0134 | CVE-2018-9381 | Google of Android Vulnerability in using uninitialized resources in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
In gatts_process_read_by_type_req of gatt_sr.c, there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in the use of uninitialized resources.Information may be obtained. Google Pixel is a smartphone produced by Google in the United States.
There is a security vulnerability in Google Pixel. No detailed vulnerability details are provided at present
VAR-202411-1755 | CVE-2024-12002 | plural Shenzhen Tenda Technology Co.,Ltd. In the product NULL Pointer dereference vulnerability |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: Medium |
A vulnerability classified as problematic was found in Tenda FH451, FH1201, FH1202 and FH1206 up to 20241129. Affected by this vulnerability is the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. fh451 firmware, fh1201 firmware, FH1202 firmware etc. Shenzhen Tenda Technology Co.,Ltd. The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
VAR-202411-1987 | CVE-2024-53623 | TP-LINK Archer C7 Access Control Error Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Incorrect access control in the component l_0_0.xml of TP-Link ARCHER-C7 v5 allows attackers to access sensitive information. TP-LINK Archer C7 is a wireless router from TP-LINK of China
VAR-202411-1640 | CVE-2024-48286 | Linksys E3000 diag_ping_start Command Injection Vulnerability |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Linksys E3000 is a powerful dual-band Wireless-N router from Linksys, an American company.
There is a security vulnerability in diag_ping_start of Linksys E3000. A remote attacker can use this vulnerability to submit special requests and execute arbitrary commands in the context of the application.
VAR-202411-1649 | CVE-2024-11799 | Fuji Electric's Tellus Lite V-Simulator Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24664. Fuji Electric's Tellus Lite V-Simulator Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state