VARIoT IoT vulnerabilities database
VAR-202402-0826 | CVE-2024-24543 | Shenzhen Tenda Technology Co.,Ltd. of AC9 Out-of-bounds write vulnerability in firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Buffer Overflow vulnerability in the function setSchedWifi in Tenda AC9 v.3.0, firmware version v.15.03.06.42_multi allows a remote attacker to cause a denial of service or run arbitrary code via crafted overflow data. Shenzhen Tenda Technology Co.,Ltd. of AC9 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state.
Tenda AC9 has a buffer overflow vulnerability. The vulnerability stems from the failure of the setSchedWifi function to correctly verify the length of input data
VAR-202402-0244 | CVE-2024-20003 | media tech's NR15 Input verification vulnerability in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
In Modem NL1, there is a possible system crash due to an improper input validation. This could lead to remote denial of service, if NW sent invalid NR RRC Connection Setup message, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01191612; Issue ID: MOLY01191612 (MSV-981). media tech's NR15 There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state
VAR-202402-0122 | CVE-2023-31006 | IBM of Security Verify Access and Security Verify Access Docker Vulnerability in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) is vulnerable to a denial of service attacks on the DSC server. IBM X-Force ID: 254776
VAR-202402-0256 | CVE-2023-31005 | IBM of Security Verify Access and Security Verify Access Docker Vulnerability in privilege management in |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a local user to escalate their privileges due to an improper security configuration. IBM X-Force ID: 254767. (DoS) It may be in a state
VAR-202402-0149 | CVE-2023-32329 | IBM of Security Verify Access and Security Verify Access Docker Inadequate validation of data reliability in |
CVSS V2: - CVSS V3: 5.5 Severity: MEDIUM |
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a user to download files from an incorrect repository due to improper file validation. IBM X-Force ID: 254972
VAR-202402-0283 | CVE-2023-30999 | IBM of Security Verify Access and Security Verify Access Docker Resource exhaustion vulnerability in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow an attacker to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 254651
VAR-202402-0305 | CVE-2023-31004 | IBM of Security Verify Access and Security Verify Access Docker Man-in-the-middle vulnerability in |
CVSS V2: - CVSS V3: 9.0 Severity: CRITICAL |
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a remote attacker to gain access to the underlying system using man in the middle techniques. IBM X-Force ID: 254765. (DoS) It may be in a state
VAR-202402-0187 | CVE-2023-32327 | IBM of Security Verify Access and Security Verify Access Docker In XML External entity vulnerabilities |
CVSS V2: - CVSS V3: 7.1 Severity: HIGH |
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 254783
VAR-202402-0322 | CVE-2023-43016 | IBM of Security Verify Access and Security Verify Access Docker Vulnerability in requesting weak passwords in |
CVSS V2: - CVSS V3: 7.3 Severity: HIGH |
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a remote user to log into the server due to a user account with an empty password. IBM X-Force ID: 266154. (DoS) It may be in a state
VAR-202402-0004 | CVE-2024-21764 | Rapid SCADA Vulnerability in using hard-coded credentials in |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the product uses hard-coded credentials, which may allow an attacker to connect to a specific port. Rapid SCADA Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-0005 | CVE-2024-22016 | Rapid SCADA Vulnerability in improper permission assignment for critical resources in |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an authorized user can write directly to the Scada directory. This may allow privilege escalation. Rapid SCADA Contains a vulnerability in improper permission assignment for critical resources.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202402-0008 | CVE-2024-21866 | Rapid SCADA Vulnerability regarding information leakage due to error messages in |
CVSS V2: - CVSS V3: 5.3 Severity: MEDIUM |
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product responds back with an error message containing sensitive data if it receives a specific malformed request. Rapid SCADA Contains a vulnerability related to information leakage due to error messages.Information may be obtained
VAR-202402-0010 | CVE-2024-22096 | Rapid SCADA Past traversal vulnerability in |
CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM |
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can append path traversal characters to the filename when using a specific command, allowing them to read arbitrary files from the system. Rapid SCADA Exists in a past traversal vulnerability.Information may be obtained
VAR-202402-0009 | CVE-2024-21794 | Rapid SCADA Open redirect vulnerability in |
CVSS V2: - CVSS V3: 5.4 Severity: MEDIUM |
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can redirect users to malicious pages through the login page. Rapid SCADA Exists in an open redirect vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state
VAR-202402-0007 | CVE-2024-21869 | Rapid SCADA Vulnerability regarding insufficient protection of authentication information in |
CVSS V2: - CVSS V3: 5.5 Severity: MEDIUM |
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product stores plaintext credentials in various places. This may allow an attacker with local access to see them. Rapid SCADA There are vulnerabilities in inadequate protection of credentials.Information may be obtained
VAR-202402-0011 | CVE-2024-21780 | HOME SPOT CUBE2 Multiple buffer overflow vulnerabilities in |
CVSS V2: - CVSS V3: 7.5 Severity: HIGH |
Stack-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. Processing a specially crafted command may result in a denial of service (DoS) condition. Note that the affected products are no longer supported. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows
VAR-202402-0012 | CVE-2024-23978 | HOME SPOT CUBE2 Multiple buffer overflow vulnerabilities in |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
Heap-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. By processing invalid values, arbitrary code may be executed. Note that the affected products are no longer supported. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows
VAR-202402-0006 | CVE-2024-21852 | Rapid SCADA Past traversal vulnerability in |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can supply a malicious configuration file by utilizing a Zip Slip vulnerability in the unpacking routine to achieve remote code execution. Rapid SCADA Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202401-1419 | CVE-2024-21917 | Rockwell Automation of FactoryTalk Services Platform Digital Signature Verification Vulnerability in |
CVSS V2: - CVSS V3: 9.1 Severity: CRITICAL |
A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious user to obtain the service token and use it for authentication on another FTSP directory. This is due to the lack of digital signing between the FTSP service token and directory. If exploited, a malicious user could potentially retrieve user information and modify settings without any authentication
VAR-202401-1568 | CVE-2024-24747 | Minio Inc. of Minio Vulnerability in privilege management in |
CVSS V2: - CVSS V3: 8.8 Severity: HIGH |
MinIO is a High Performance Object Storage. When someone creates an access key, it inherits the permissions of the parent key. Not only for `s3:*` actions, but also `admin:*` actions. Which means unless somewhere above in the access-key hierarchy, the `admin` rights are denied, access keys will be able to simply override their own `s3` permissions to something more permissive. The vulnerability is fixed in RELEASE.2024-01-31T20-20-33Z. Minio Inc. of Minio Exists in a permission management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state