VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202309-2235 CVE-2023-39285 CVSS V2: -
CVSS V3: 4.3
Severity: MEDIUM
A vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 SP3 (22.24.5800.0) could allow an unauthenticated attacker to perform a Cross Site Request Forgery (CSRF) attack due to insufficient request validation. A successful exploit could allow an attacker to provide a modified URL, potentially enabling them to modify system configuration settings.
VAR-202309-2820 No CVE There is an information leakage vulnerability in the load balancing system of Beijing Tianrongxin Technology Co., Ltd. CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Tianrongxin load balancing system can provide users with a complete set of data center solutions, including link load balancing and server load balancing in a single data center, as well as global load balancing in multiple data centers. There is an information leakage vulnerability in the load balancing system of Beijing Tianrongxin Technology Co., Ltd. An attacker can use the vulnerability to obtain sensitive information.
VAR-202309-2842 No CVE New H3C Technology Co., Ltd. GR-1200W has a binary vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
The GR-1200W router is a wireless enterprise-level routing device produced by H3C Technology Co., Ltd. (H3C). There is a binary vulnerability in the GR-1200W of H3C Technology Co., Ltd., which can be used by attackers to gain server permissions.
VAR-202309-2837 No CVE There is a command execution vulnerability in the MPSec MSG4000 security gateway of Maipu Telecom Technology Co., Ltd. CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
MPSec MSG4000 is a security gateway product of Maipu Communication Technology Co., Ltd. There is a command execution vulnerability in the MPSec MSG4000 security gateway of Maipu Communication Technology Co., Ltd. An attacker can use the vulnerability to obtain server permissions.
VAR-202309-0631 CVE-2023-38557 Siemens'  Spectrum Power 7  Vulnerability in improper permission assignment for critical resources in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
A vulnerability has been identified in Spectrum Power 7 (All versions < V23Q3). The affected product assigns improper access rights to the update script. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges. Siemens' Spectrum Power 7 Contains a vulnerability in improper permission assignment for critical resources.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Spectrum Power 7 provides basic components for SCADA, communications and data modeling for control and monitoring systems. Suites of applications can be added to optimize network and generation management in all areas of energy management
VAR-202309-0621 CVE-2023-38558 Siemens SIMATIC PCS neo (Administration Console) information leakage vulnerability CVSS V2: 4.6
CVSS V3: 5.5
Severity: MEDIUM
A vulnerability has been identified in SIMATIC PCS neo (Administration Console) V4.0 (All versions), SIMATIC PCS neo (Administration Console) V4.0 Update 1 (All versions). The affected application leaks Windows admin credentials. An attacker with local access to the Administration Console could get the credentials, and impersonate the admin user, thereby gaining admin access to other Windows systems
VAR-202309-0673 CVE-2023-4701 CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
A Improper Privilege Management vulnerability through an incorrect use of privileged APIs in CodeMeter Runtime versions prior to 7.60c allow a local, low privileged attacker to use an API call for escalation of privileges in order gain full admin access on the host system
VAR-202309-2870 No CVE Ruijie Networks Co., Ltd. RG-NBR1600G has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
RG-NBR1600G is a Gigabit router product specially designed for Internet cafes and enterprise users. Ruijie Networks Co., Ltd.'s RG-NBR1600G has an unauthorized access vulnerability that allows an attacker to obtain sensitive information.
VAR-202309-0672 CVE-2023-3935 Wibu-Systems AG  of  CodeMeter Runtime  Out-of-bounds write vulnerability in products from multiple vendors such as CVSS V2: 7.6
CVSS V3: 9.8
Severity: CRITICAL
A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system. Wibu-Systems AG of CodeMeter Runtime Products from multiple vendors, such as the following, contain out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. PSS(R)CAPE is a transmission and distribution network protection simulation software. PSS(R)E is a power system simulation and analysis tool for transmission operation and planning. PSS(R)ODMS is a CIM-based network model management tool with network analysis capabilities for planning and operational planning of transmission utilities. SIMATIC PCS neo is a distributed control system (DCS). SIMATIC WinCC Open Architecture (OA) is part of the SIMATIC HMI family. It is designed for applications requiring a high degree of customer-specific adaptability, large or complex applications, and projects that impose specific system requirements or functionality. SIMIT Simulation Platform allows simulating factory settings to predict failures at an early planning stage. SINEC INS (Infrastructure Network Services) is a web-based application that combines various network services in one tool. SINEMA Remote Connect is a management platform for remote networks that allows simple management of tunnel connections (VPN) between headquarters, service technicians and installed machines or plants. Siemens Industrial product WIBU system CodeMeter has a heap buffer overflow vulnerability, which is caused by failure to perform correct boundary checks. An attacker could exploit this vulnerability to cause a buffer overflow and execute arbitrary code on the system
VAR-202309-2879 No CVE Maipu Telecom Technology Co., Ltd. MPSec ISG1000 security gateway has an information leakage vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
MPSec ISG1000 is a security gateway product of Maipu Communication Technology Co., Ltd. Maipu Telecom Technology Co., Ltd.'s MPSec ISG1000 security gateway has an information leakage vulnerability that allows attackers to exploit the vulnerability to obtain sensitive information.
VAR-202309-2171 CVE-2023-2071 Rockwell Automation PanelView Plus Code Issue Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets.  The device has the functionality, through a CIP class, to execute exported functions from libraries.  There is a routine that restricts it to execute specific functions from two dynamic link library files.  By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function. Rockwell Automation PanelView Plus is a human-machine interface (HMI) product line from Rockwell Automation. These HMI devices are designed to integrate with industrial automation systems to provide operators with an intuitive interface to control and monitor production processes. PanelView Plus has a wide range of applications, especially in manufacturing, industrial control, and process control
VAR-202309-2231 CVE-2023-39637 CVSS V2: -
CVSS V3: 9.8
Severity: CRITICAL
D-Link DIR-816 A2 1.10 B05 was discovered to contain a command injection vulnerability via the component /goform/Diagnosis.
VAR-202309-1960 CVE-2023-41367 CVSS V2: -
CVSS V3: 5.3
Severity: MEDIUM
Due to missing authentication check in webdynpro application, an unauthorized user in SAP NetWeaver (Guided Procedures) - version 7.50, can gain access to admin view of specific function anonymously. On successful exploitation of vulnerability under specific circumstances, attacker can view user’s email address. There is no integrity/availability impact.
VAR-202309-2835 No CVE MOXA E1242 Ethernet IO Server has unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Mosa Technology (Shanghai) Co., Ltd. is an enterprise mainly engaged in professional technical services. There is an unauthorized access vulnerability in the MOXA E1242 Ethernet IO Server. An attacker can use this vulnerability to obtain sensitive information.
VAR-202309-0575 CVE-2023-38070 Siemens'  JT2Go  and  Teamcenter Visualization  Out-of-bounds write vulnerability in CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application is vulnerable to stack-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20818). Siemens' JT2Go and Teamcenter Visualization Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer
VAR-202309-0574 CVE-2023-38073 Siemens Tecnomatix Plant Simulation WRL File Parsing Type Confusion Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application contains a type confusion vulnerability while parsing WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20826). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition
VAR-202309-0577 CVE-2023-38076 Siemens'  JT2Go  and  Teamcenter Visualization  Out-of-bounds write vulnerability in CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21041). Siemens' JT2Go and Teamcenter Visualization Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer
VAR-202309-0578 CVE-2023-38074 Siemens Tecnomatix Plant Simulation WRL File Parsing Type Confusion Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application contains a type confusion vulnerability while parsing WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20840). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition
VAR-202309-0576 CVE-2023-38071 Siemens Tecnomatix Plant Simulation WRL File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20824). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer
VAR-202309-0807 CVE-2023-29463 Rockwell Automation  Made  Pavilion8  Improper authentication vulnerability in CVSS V2: 9.0
CVSS V3: 5.4
Severity: MEDIUM
The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users’ session data and or log users out of their session. * Inappropriate authentication (CWE-287) - CVE-2023-29463If the vulnerability is exploited, it may be affected as follows