VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202403-0112 CVE-2024-24906 Dell's  secure connect gateway  Cross-site scripting vulnerability in CVSS V2: 6.7
CVSS V3: 7.6
Severity: HIGH
Dell Secure Connect Gateway (SCG) Policy Manager, all versions, contain(s) a Stored Cross-Site Scripting Vulnerability in Policy page. An adjacent network high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. Dell Secure Connect Gateway is a secure connection gateway of Dell (Dell) in the United States. No detailed vulnerability details are currently provided
VAR-202403-0456 CVE-2024-24900 Dell's  secure connect gateway  Vulnerability in CVSS V2: 6.2
CVSS V3: 5.8
Severity: MEDIUM
Dell Secure Connect Gateway (SCG) Policy Manager, all versions, contain an improper authorization vulnerability. An adjacent network low privileged attacker could potentially exploit this vulnerability, leading to unauthorized devices added to policies. Exploitation may lead to information disclosure and unauthorized access to the system. Dell's secure connect gateway Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. No detailed vulnerability details are currently provided
VAR-202403-0458 CVE-2024-22458 Dell's  secure connect gateway  Vulnerability in using cryptographic algorithms in CVSS V2: 2.6
CVSS V3: 3.7
Severity: LOW
Dell Secure Connect Gateway, 5.18, contains an Inadequate Encryption Strength Vulnerability. An unauthenticated network attacker could potentially exploit this vulnerability, allowing an attacker to recover plaintext from a block of ciphertext. No detailed vulnerability details are currently available
VAR-202403-0198 CVE-2024-22457 Dell's  secure connect gateway  Spoofing authentication evasion vulnerability in CVSS V2: -
CVSS V3: 7.1
Severity: HIGH
Dell Secure Connect Gateway 5.20 contains an improper authentication vulnerability during the SRS to SCG update path. A remote low privileged attacker could potentially exploit this vulnerability, leading to impersonation of the server through presenting a fake self-signed certificate and communicating with the remote server. Dell's secure connect gateway Exists in spoofing authentication evasion vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-3319 CVE-2024-0387 MOXA EDS-4000/G4000 Series Security Bypass Vulnerability CVSS V2: 5.2
CVSS V3: 6.5
Severity: MEDIUM
The EDS-4000/G4000 Series prior to version 3.2 includes IP forwarding capabilities that users cannot deactivate. An attacker may be able to send requests to the product and have it forwarded to the target. An attacker can bypass access controls or hide the source of malicious requests. MOXA EDS-4000/G4000 Series is a series of industrial managed Ethernet switches from China's MOXA company. There is a security bypass vulnerability in MOXA EDS-4000/G4000 Series versions prior to 3.2
VAR-202402-2601 No CVE There is a command execution vulnerability in EG3210 of Beijing StarNet Ruijie Network Technology Co., Ltd. CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Beijing Xingwang Ruijie Network Technology Co., Ltd. EG3210 is a router product. There is a command execution vulnerability in the EG3210 of Beijing StarNet Ruijie Network Technology Co., Ltd. An attacker can use this vulnerability to gain control of the server.
VAR-202402-3290 CVE-2024-22395 plural  SonicWALL  Product vulnerabilities CVSS V2: -
CVSS V3: 6.3
Severity: MEDIUM
Improper access control vulnerability has been identified in the SMA100 SSL-VPN virtual office portal, which in specific conditions could potentially enable a remote authenticated attacker to associate another user's MFA mobile application. SMA200 firmware, SMA210 firmware, SMA400 firmware etc. SonicWALL There are unspecified vulnerabilities in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2325 CVE-2024-1786 D-Link Systems, Inc.  of  DIR-600M  Classic buffer overflow vulnerability in firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DIR-600M C1 3.08. Affected by this issue is some unknown functionality of the component Telnet Service. The manipulation of the argument username leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254576. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. D-Link Systems, Inc. of DIR-600M Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202402-2400 No CVE Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6205-E has a command execution vulnerability (CNVD-2024-07921) CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
NBR6205-E is a router product. Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6205-E has a command execution vulnerability. An attacker can use this vulnerability to gain server permissions.
VAR-202402-2068 CVE-2024-25468 TOTOLINK  of  X5000R  in the firmware  OS  Command injection vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An issue in TOTOLINK X5000R V.9.1.0u.6369_B20230113 allows a remote attacker to cause a denial of service via the host_time parameter of the NTPSyncWithHost component. TOTOLINK of X5000R The firmware has OS A command injection vulnerability exists.Service operation interruption (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics
VAR-202402-1769 CVE-2024-21915 CVSS V2: -
CVSS V3: 9.0
Severity: CRITICAL
A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable
VAR-202402-1803 CVE-2023-45581 fortinet's  FortiClient EMS  Vulnerability in CVSS V2: -
CVSS V3: 7.2
Severity: HIGH
An improper privilege management vulnerability [CWE-269] in Fortinet FortiClientEMS version 7.2.0 through 7.2.2 and before 7.0.10 allows an Site administrator with Super Admin privileges to perform global administrative operations affecting other sites via crafted HTTP or HTTPS requests. fortinet's FortiClient EMS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-1750 CVE-2023-28078 Dell's  smartfabric os10  Vulnerability in CVSS V2: 9.4
CVSS V3: 9.1
Severity: CRITICAL
Dell OS10 Networking Switches running 10.5.2.x and above contain a vulnerability with zeroMQ when VLT is configured. A remote unauthenticated attacker could potentially exploit this vulnerability leading to information disclosure and a possible Denial of Service when a huge number of requests are sent to the switch. This is a high severity vulnerability as it allows an attacker to view sensitive data. Dell recommends customers to upgrade at the earliest opportunity. Dell's smartfabric os10 Exists in unspecified vulnerabilities.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202402-1924 CVE-2023-32462 Dell's  smartfabric os10  In  OS  Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Dell OS10 Networking Switches running 10.5.2.x and above contain an OS command injection vulnerability when using remote user authentication. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands and possible system takeover. This is a critical vulnerability as it allows an attacker to cause severe damage. Dell recommends customers to upgrade at the earliest opportunity. (DoS) It may be in a state. Dell OS10 Networking Switches is a switch made by the American company Dell
VAR-202402-1804 CVE-2023-44294 Dell's  secure connect gateway  In  SQL  Injection vulnerability CVSS V2: 5.5
CVSS V3: 6.5
Severity: MEDIUM
In Dell Secure Connect Gateway Application and Secure Connect Gateway Appliance (between v5.10.00.00 and v5.18.00.00), a security concern has been identified, where a malicious user with a valid User session may inject malicious content in filters of Collection Rest API. This issue may potentially lead to unintentional information disclosure from the product database. Dell's secure connect gateway for, SQL There is an injection vulnerability.Information may be obtained
VAR-202402-1915 CVE-2023-44293 Dell's  secure connect gateway  In  SQL  Injection vulnerability CVSS V2: 5.5
CVSS V3: 6.5
Severity: MEDIUM
In Dell Secure Connect Gateway Application and Secure Connect Gateway Appliance (between v5.10.00.00 and v5.18.00.00), a security concern has been identified, where a malicious user with a valid User session may inject malicious content in filters of IP Range Rest API.  This issue may potentially lead to unintentional information disclosure from the product database. Dell's secure connect gateway for, SQL There is an injection vulnerability.Information may be obtained
VAR-202402-1912 CVE-2023-50927 Contiki-NG  Out-of-bounds read vulnerability in CVSS V2: -
CVSS V3: 8.6
Severity: HIGH
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An attacker can trigger out-of-bounds reads in the RPL-Lite implementation of the RPL protocol in the Contiki-NG operating system. This vulnerability is caused by insufficient control of the lengths for DIO and DAO messages, in particular when they contain RPL sub-option headers. The problem has been patched in Contiki-NG 4.9. Users are advised to upgrade. Users unable to upgrade should manually apply the code changes in PR #2484. Contiki-NG Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202402-1858 CVE-2023-48229 Contiki-NG  Out-of-bounds write vulnerability in CVSS V2: -
CVSS V3: 7.0
Severity: HIGH
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds write exists in the driver for IEEE 802.15.4 radios on nRF platforms in the Contiki-NG operating system. The problem is triggered when parsing radio frames in the `read_frame` function in the `arch/cpu/nrf/net/nrf-ieee-driver-arch.c` module. More specifically, the `read_frame` function performs an incomplete validation of the payload length of the packet, which is a value that can be set by an external party that sends radio packets to a Contiki-NG system. Although the value is validated to be in the range of the MTU length, it is not validated to fit into the given buffer into which the packet will be copied. The problem has been patched in the "develop" branch of Contiki-NG and is expected to be included in subsequent releases. Users are advised to update their develop branch or to update to a subsequent release when available. Users unable to upgrade should consider manually applying the changes in PR #2741. Contiki-NG Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2171 CVE-2023-50926 Contiki-NG  Out-of-bounds read vulnerability in CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be caused by an incoming DIO message when using the RPL-Lite implementation in the Contiki-NG operating system. More specifically, the prefix information of the DIO message contains a field that specifies the length of an IPv6 address prefix. The value of this field is not validated, which means that an attacker can set a value that is longer than the maximum prefix length. Subsequently, a memcmp function call that compares different prefixes can be called with a length argument that surpasses the boundary of the array allocated for the prefix, causing an out-of-bounds read. The problem has been patched in the "develop" branch of Contiki-NG, and is expected to be included in the next release. Users are advised to update as soon as they are able to or to manually apply the changes in Contiki-NG pull request #2721. Contiki-NG Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202402-1317 CVE-2024-23804 Siemens'  Tecnomatix Plant Simulation  Out-of-bounds write vulnerability in CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected applications contain a stack overflow vulnerability while parsing specially crafted PSOBJ files. This could allow an attacker to execute code in the context of the current process. Siemens' Tecnomatix Plant Simulation Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state