VARIoT IoT vulnerabilities database
![](/static/front/logo.webp)
VAR-202403-0112 | CVE-2024-24906 | Dell's secure connect gateway Cross-site scripting vulnerability in |
CVSS V2: 6.7 CVSS V3: 7.6 Severity: HIGH |
Dell Secure Connect Gateway (SCG) Policy Manager, all versions, contain(s) a Stored Cross-Site Scripting Vulnerability in Policy page. An adjacent network high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. Dell Secure Connect Gateway is a secure connection gateway of Dell (Dell) in the United States. No detailed vulnerability details are currently provided
VAR-202403-0456 | CVE-2024-24900 | Dell's secure connect gateway Vulnerability in |
CVSS V2: 6.2 CVSS V3: 5.8 Severity: MEDIUM |
Dell Secure Connect Gateway (SCG) Policy Manager, all versions, contain an improper authorization vulnerability. An adjacent network low privileged attacker could potentially exploit this vulnerability, leading to unauthorized devices added to policies. Exploitation may lead to information disclosure and unauthorized access to the system. Dell's secure connect gateway Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. No detailed vulnerability details are currently provided
VAR-202403-0458 | CVE-2024-22458 | Dell's secure connect gateway Vulnerability in using cryptographic algorithms in |
CVSS V2: 2.6 CVSS V3: 3.7 Severity: LOW |
Dell Secure Connect Gateway, 5.18, contains an Inadequate Encryption Strength Vulnerability. An unauthenticated network attacker could potentially exploit this vulnerability, allowing an attacker to recover plaintext from a block of ciphertext. No detailed vulnerability details are currently available
VAR-202403-0198 | CVE-2024-22457 | Dell's secure connect gateway Spoofing authentication evasion vulnerability in |
CVSS V2: - CVSS V3: 7.1 Severity: HIGH |
Dell Secure Connect Gateway 5.20 contains an improper authentication vulnerability during the SRS to SCG update path. A remote low privileged attacker could potentially exploit this vulnerability, leading to impersonation of the server through presenting a fake self-signed certificate and communicating with the remote server. Dell's secure connect gateway Exists in spoofing authentication evasion vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-3319 | CVE-2024-0387 | MOXA EDS-4000/G4000 Series Security Bypass Vulnerability |
CVSS V2: 5.2 CVSS V3: 6.5 Severity: MEDIUM |
The EDS-4000/G4000 Series prior to version 3.2 includes IP forwarding capabilities that users cannot deactivate. An attacker may be able to send requests to the product and have it forwarded to the target. An attacker can bypass access controls or hide the source of malicious requests. MOXA EDS-4000/G4000 Series is a series of industrial managed Ethernet switches from China's MOXA company.
There is a security bypass vulnerability in MOXA EDS-4000/G4000 Series versions prior to 3.2
VAR-202402-2601 | No CVE | There is a command execution vulnerability in EG3210 of Beijing StarNet Ruijie Network Technology Co., Ltd. |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Beijing Xingwang Ruijie Network Technology Co., Ltd. EG3210 is a router product.
There is a command execution vulnerability in the EG3210 of Beijing StarNet Ruijie Network Technology Co., Ltd. An attacker can use this vulnerability to gain control of the server.
VAR-202402-3290 | CVE-2024-22395 | plural SonicWALL Product vulnerabilities |
CVSS V2: - CVSS V3: 6.3 Severity: MEDIUM |
Improper access control vulnerability has been identified in the SMA100 SSL-VPN virtual office portal, which in specific conditions could potentially enable a remote authenticated attacker to associate another user's MFA mobile application. SMA200 firmware, SMA210 firmware, SMA400 firmware etc. SonicWALL There are unspecified vulnerabilities in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2325 | CVE-2024-1786 | D-Link Systems, Inc. of DIR-600M Classic buffer overflow vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DIR-600M C1 3.08. Affected by this issue is some unknown functionality of the component Telnet Service. The manipulation of the argument username leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254576. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. D-Link Systems, Inc. of DIR-600M Firmware has a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202402-2400 | No CVE | Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6205-E has a command execution vulnerability (CNVD-2024-07921) |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
NBR6205-E is a router product.
Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6205-E has a command execution vulnerability. An attacker can use this vulnerability to gain server permissions.
VAR-202402-2068 | CVE-2024-25468 | TOTOLINK of X5000R in the firmware OS Command injection vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue in TOTOLINK X5000R V.9.1.0u.6369_B20230113 allows a remote attacker to cause a denial of service via the host_time parameter of the NTPSyncWithHost component. TOTOLINK of X5000R The firmware has OS A command injection vulnerability exists.Service operation interruption (DoS) It may be in a state. TOTOLINK X5000R is a router from China's TOTOLINK Electronics
VAR-202402-1769 | CVE-2024-21915 |
CVSS V2: - CVSS V3: 9.0 Severity: CRITICAL |
A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable
VAR-202402-1803 | CVE-2023-45581 | fortinet's FortiClient EMS Vulnerability in |
CVSS V2: - CVSS V3: 7.2 Severity: HIGH |
An improper privilege management vulnerability [CWE-269] in Fortinet FortiClientEMS version 7.2.0 through 7.2.2 and before 7.0.10 allows an Site administrator with Super Admin privileges to perform global administrative operations affecting other sites via crafted HTTP or HTTPS requests. fortinet's FortiClient EMS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-1750 | CVE-2023-28078 | Dell's smartfabric os10 Vulnerability in |
CVSS V2: 9.4 CVSS V3: 9.1 Severity: CRITICAL |
Dell OS10 Networking Switches running 10.5.2.x and above contain a vulnerability with zeroMQ when VLT is configured. A remote unauthenticated attacker could potentially exploit this vulnerability leading to information disclosure and a possible Denial of Service when a huge number of requests are sent to the switch. This is a high severity vulnerability as it allows an attacker to view sensitive data. Dell recommends customers to upgrade at the earliest opportunity. Dell's smartfabric os10 Exists in unspecified vulnerabilities.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202402-1924 | CVE-2023-32462 | Dell's smartfabric os10 In OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Dell OS10 Networking Switches running 10.5.2.x and above contain an OS command injection vulnerability when using remote user authentication. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands and possible system takeover. This is a critical vulnerability as it allows an attacker to cause severe damage. Dell recommends customers to upgrade at the earliest opportunity. (DoS) It may be in a state. Dell OS10 Networking Switches is a switch made by the American company Dell
VAR-202402-1804 | CVE-2023-44294 | Dell's secure connect gateway In SQL Injection vulnerability |
CVSS V2: 5.5 CVSS V3: 6.5 Severity: MEDIUM |
In Dell Secure Connect Gateway Application and Secure Connect Gateway Appliance (between v5.10.00.00 and v5.18.00.00), a security concern has been identified, where a malicious user with a valid User session may inject malicious content in filters of Collection Rest API.
This issue may potentially lead to unintentional information disclosure from the product database. Dell's secure connect gateway for, SQL There is an injection vulnerability.Information may be obtained
VAR-202402-1915 | CVE-2023-44293 | Dell's secure connect gateway In SQL Injection vulnerability |
CVSS V2: 5.5 CVSS V3: 6.5 Severity: MEDIUM |
In Dell Secure Connect Gateway Application and Secure Connect Gateway Appliance (between v5.10.00.00 and v5.18.00.00), a security concern has been identified, where a malicious user with a valid User session may inject malicious content in filters of IP Range Rest API. This issue may potentially lead to unintentional information disclosure from the product database. Dell's secure connect gateway for, SQL There is an injection vulnerability.Information may be obtained
VAR-202402-1912 | CVE-2023-50927 | Contiki-NG Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 8.6 Severity: HIGH |
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An attacker can trigger out-of-bounds reads in the RPL-Lite implementation of the RPL protocol in the Contiki-NG operating system. This vulnerability is caused by insufficient control of the lengths for DIO and DAO messages, in particular when they contain RPL sub-option headers. The problem has been patched in Contiki-NG 4.9. Users are advised to upgrade. Users unable to upgrade should manually apply the code changes in PR #2484. Contiki-NG Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202402-1858 | CVE-2023-48229 | Contiki-NG Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 7.0 Severity: HIGH |
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds write exists in the driver for IEEE 802.15.4 radios on nRF platforms in the Contiki-NG operating system. The problem is triggered when parsing radio frames in the `read_frame` function in the `arch/cpu/nrf/net/nrf-ieee-driver-arch.c` module. More specifically, the `read_frame` function performs an incomplete validation of the payload length of the packet, which is a value that can be set by an external party that sends radio packets to a Contiki-NG system. Although the value is validated to be in the range of the MTU length, it is not validated to fit into the given buffer into which the packet will be copied. The problem has been patched in the "develop" branch of Contiki-NG and is expected to be included in subsequent releases. Users are advised to update their develop branch or to update to a subsequent release when available. Users unable to upgrade should consider manually applying the changes in PR #2741. Contiki-NG Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-2171 | CVE-2023-50926 | Contiki-NG Out-of-bounds read vulnerability in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be caused by an incoming DIO message when using the RPL-Lite implementation in the Contiki-NG operating system. More specifically, the prefix information of the DIO message contains a field that specifies the length of an IPv6 address prefix. The value of this field is not validated, which means that an attacker can set a value that is longer than the maximum prefix length. Subsequently, a memcmp function call that compares different prefixes can be called with a length argument that surpasses the boundary of the array allocated for the prefix, causing an out-of-bounds read. The problem has been patched in the "develop" branch of Contiki-NG, and is expected to be included in the next release. Users are advised to update as soon as they are able to or to manually apply the changes in Contiki-NG pull request #2721. Contiki-NG Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202402-1317 | CVE-2024-23804 | Siemens' Tecnomatix Plant Simulation Out-of-bounds write vulnerability in |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected applications contain a stack overflow vulnerability while parsing specially crafted PSOBJ files. This could allow an attacker to execute code in the context of the current process. Siemens' Tecnomatix Plant Simulation Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state