VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202402-0826 CVE-2024-24543 Shenzhen Tenda Technology Co.,Ltd.  of  AC9  Out-of-bounds write vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Buffer Overflow vulnerability in the function setSchedWifi in Tenda AC9 v.3.0, firmware version v.15.03.06.42_multi allows a remote attacker to cause a denial of service or run arbitrary code via crafted overflow data. Shenzhen Tenda Technology Co.,Ltd. of AC9 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tenda AC9 has a buffer overflow vulnerability. The vulnerability stems from the failure of the setSchedWifi function to correctly verify the length of input data
VAR-202402-0244 CVE-2024-20003 media tech's  NR15  Input verification vulnerability in CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
In Modem NL1, there is a possible system crash due to an improper input validation. This could lead to remote denial of service, if NW sent invalid NR RRC Connection Setup message, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01191612; Issue ID: MOLY01191612 (MSV-981). media tech's NR15 There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state
VAR-202402-0122 CVE-2023-31006 IBM  of  Security Verify Access  and  Security Verify Access Docker  Vulnerability in CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) is vulnerable to a denial of service attacks on the DSC server. IBM X-Force ID: 254776
VAR-202402-0256 CVE-2023-31005 IBM  of  Security Verify Access  and  Security Verify Access Docker  Vulnerability in privilege management in CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a local user to escalate their privileges due to an improper security configuration. IBM X-Force ID: 254767. (DoS) It may be in a state
VAR-202402-0149 CVE-2023-32329 IBM  of  Security Verify Access  and  Security Verify Access Docker  Inadequate validation of data reliability in CVSS V2: -
CVSS V3: 5.5
Severity: MEDIUM
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a user to download files from an incorrect repository due to improper file validation. IBM X-Force ID: 254972
VAR-202402-0283 CVE-2023-30999 IBM  of  Security Verify Access  and  Security Verify Access Docker  Resource exhaustion vulnerability in CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow an attacker to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 254651
VAR-202402-0305 CVE-2023-31004 IBM  of  Security Verify Access  and  Security Verify Access Docker  Man-in-the-middle vulnerability in CVSS V2: -
CVSS V3: 9.0
Severity: CRITICAL
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a remote attacker to gain access to the underlying system using man in the middle techniques. IBM X-Force ID: 254765. (DoS) It may be in a state
VAR-202402-0187 CVE-2023-32327 IBM  of  Security Verify Access  and  Security Verify Access Docker  In  XML  External entity vulnerabilities CVSS V2: -
CVSS V3: 7.1
Severity: HIGH
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 254783
VAR-202402-0322 CVE-2023-43016 IBM  of  Security Verify Access  and  Security Verify Access Docker  Vulnerability in requesting weak passwords in CVSS V2: -
CVSS V3: 7.3
Severity: HIGH
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a remote user to log into the server due to a user account with an empty password. IBM X-Force ID: 266154. (DoS) It may be in a state
VAR-202402-0004 CVE-2024-21764 Rapid SCADA  Vulnerability in using hard-coded credentials in CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the product uses hard-coded credentials, which may allow an attacker to connect to a specific port. Rapid SCADA Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-0005 CVE-2024-22016 Rapid SCADA  Vulnerability in improper permission assignment for critical resources in CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an authorized user can write directly to the Scada directory. This may allow privilege escalation. Rapid SCADA Contains a vulnerability in improper permission assignment for critical resources.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-0008 CVE-2024-21866 Rapid SCADA  Vulnerability regarding information leakage due to error messages in CVSS V2: -
CVSS V3: 5.3
Severity: MEDIUM
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product responds back with an error message containing sensitive data if it receives a specific malformed request. Rapid SCADA Contains a vulnerability related to information leakage due to error messages.Information may be obtained
VAR-202402-0010 CVE-2024-22096 Rapid SCADA  Past traversal vulnerability in CVSS V2: -
CVSS V3: 6.5
Severity: MEDIUM
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can append path traversal characters to the filename when using a specific command, allowing them to read arbitrary files from the system. Rapid SCADA Exists in a past traversal vulnerability.Information may be obtained
VAR-202402-0009 CVE-2024-21794 Rapid SCADA  Open redirect vulnerability in CVSS V2: -
CVSS V3: 5.4
Severity: MEDIUM
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can redirect users to malicious pages through the login page. Rapid SCADA Exists in an open redirect vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state
VAR-202402-0007 CVE-2024-21869 Rapid SCADA  Vulnerability regarding insufficient protection of authentication information in CVSS V2: -
CVSS V3: 5.5
Severity: MEDIUM
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product stores plaintext credentials in various places. This may allow an attacker with local access to see them. Rapid SCADA There are vulnerabilities in inadequate protection of credentials.Information may be obtained
VAR-202402-0011 CVE-2024-21780 HOME SPOT CUBE2  Multiple buffer overflow vulnerabilities in CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
Stack-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. Processing a specially crafted command may result in a denial of service (DoS) condition. Note that the affected products are no longer supported. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows
VAR-202402-0012 CVE-2024-23978 HOME SPOT CUBE2  Multiple buffer overflow vulnerabilities in CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
Heap-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. By processing invalid values, arbitrary code may be executed. Note that the affected products are no longer supported. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows
VAR-202402-0006 CVE-2024-21852 Rapid SCADA  Past traversal vulnerability in CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can supply a malicious configuration file by utilizing a Zip Slip vulnerability in the unpacking routine to achieve remote code execution. Rapid SCADA Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-1419 CVE-2024-21917 Rockwell Automation  of  FactoryTalk Services Platform  Digital Signature Verification Vulnerability in CVSS V2: -
CVSS V3: 9.1
Severity: CRITICAL
A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious user to obtain the service token and use it for authentication on another FTSP directory. This is due to the lack of digital signing between the FTSP service token and directory.  If exploited, a malicious user could potentially retrieve user information and modify settings without any authentication
VAR-202401-1568 CVE-2024-24747 Minio Inc.  of  Minio  Vulnerability in privilege management in CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
MinIO is a High Performance Object Storage. When someone creates an access key, it inherits the permissions of the parent key. Not only for `s3:*` actions, but also `admin:*` actions. Which means unless somewhere above in the access-key hierarchy, the `admin` rights are denied, access keys will be able to simply override their own `s3` permissions to something more permissive. The vulnerability is fixed in RELEASE.2024-01-31T20-20-33Z. Minio Inc. of Minio Exists in a permission management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state