CWE-256
Plaintext Storage of a Password
Storing a password in plaintext may result in a system compromise.
CVE-2017-16714 (GCVE-0-2017-16714)
Vulnerability from cvelistv5
Published
2018-09-06 19:00
Modified
2024-09-17 01:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-256 - UNPROTECTED STORAGE OF CREDENTIALS
Summary
In Ice Qube Thermal Management Center versions prior to version 4.13, passwords are stored in plaintext in a file that is accessible without authentication.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ice Qube | Thermal Management Center |
Version: All versions prior to version 4.13 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:35:20.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-249-01" }, { "name": "105303", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105303" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Thermal Management Center", "vendor": "Ice Qube", "versions": [ { "status": "affected", "version": "All versions prior to version 4.13" } ] } ], "datePublic": "2018-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "In Ice Qube Thermal Management Center versions prior to version 4.13, passwords are stored in plaintext in a file that is accessible without authentication." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "UNPROTECTED STORAGE OF CREDENTIALS CWE-256", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-11T09:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-249-01" }, { "name": "105303", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105303" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-09-06T00:00:00", "ID": "CVE-2017-16714", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Thermal Management Center", "version": { "version_data": [ { "version_value": "All versions prior to version 4.13" } ] } } ] }, "vendor_name": "Ice Qube" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Ice Qube Thermal Management Center versions prior to version 4.13, passwords are stored in plaintext in a file that is accessible without authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UNPROTECTED STORAGE OF CREDENTIALS CWE-256" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-249-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-249-01" }, { "name": "105303", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105303" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2017-16714", "datePublished": "2018-09-06T19:00:00Z", "dateReserved": "2017-11-09T00:00:00", "dateUpdated": "2024-09-17T01:51:12.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-6049 (GCVE-0-2017-6049)
Vulnerability from cvelistv5
Published
2019-04-02 19:39
Modified
2024-08-05 15:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-256 - PLAINTEXT STORAGE OF A PASSWORD
Summary
Detcon Sitewatch Gateway, all versions without cellular, an attacker can edit settings on the device using a specially crafted URL.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Detcon | Sitewatch Gateway |
Version: All versions affected except cellular versions. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:18:49.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-136-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sitewatch Gateway", "vendor": "Detcon", "versions": [ { "status": "affected", "version": "All versions affected except cellular versions." } ] } ], "datePublic": "2017-05-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Detcon Sitewatch Gateway, all versions without cellular, an attacker can edit settings on the device using a specially crafted URL." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "PLAINTEXT STORAGE OF A PASSWORD CWE-256", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-02T19:39:25", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-136-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2017-6049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sitewatch Gateway", "version": { "version_data": [ { "version_value": "All versions affected except cellular versions." } ] } } ] }, "vendor_name": "Detcon" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Detcon Sitewatch Gateway, all versions without cellular, an attacker can edit settings on the device using a specially crafted URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "PLAINTEXT STORAGE OF A PASSWORD CWE-256" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-136-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-136-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2017-6049", "datePublished": "2019-04-02T19:39:25", "dateReserved": "2017-02-16T00:00:00", "dateUpdated": "2024-08-05T15:18:49.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-7913 (GCVE-0-2017-7913)
Vulnerability from cvelistv5
Published
2017-05-29 16:00
Modified
2024-08-05 16:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A Plaintext Storage of a Password issue was discovered in Moxa OnCell G3110-HSPA Version 1.3 build 15082117 and previous versions, OnCell G3110-HSDPA Version 1.2 Build 09123015 and previous versions, OnCell G3150-HSDPA Version 1.4 Build 11051315 and previous versions, OnCell 5104-HSDPA, OnCell 5104-HSPA, and OnCell 5004-HSPA. The application's configuration file contains parameters that represent passwords in plaintext.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa OnCell |
Version: Moxa OnCell |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:19:29.494Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-143-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa OnCell", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa OnCell" } ] } ], "datePublic": "2017-05-29T00:00:00", "descriptions": [ { "lang": "en", "value": "A Plaintext Storage of a Password issue was discovered in Moxa OnCell G3110-HSPA Version 1.3 build 15082117 and previous versions, OnCell G3110-HSDPA Version 1.2 Build 09123015 and previous versions, OnCell G3150-HSDPA Version 1.4 Build 11051315 and previous versions, OnCell 5104-HSDPA, OnCell 5104-HSPA, and OnCell 5004-HSPA. The application\u0027s configuration file contains parameters that represent passwords in plaintext." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "CWE-256", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-29T16:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-143-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2017-7913", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa OnCell", "version": { "version_data": [ { "version_value": "Moxa OnCell" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Plaintext Storage of a Password issue was discovered in Moxa OnCell G3110-HSPA Version 1.3 build 15082117 and previous versions, OnCell G3110-HSDPA Version 1.2 Build 09123015 and previous versions, OnCell G3150-HSDPA Version 1.4 Build 11051315 and previous versions, OnCell 5104-HSDPA, OnCell 5104-HSPA, and OnCell 5004-HSPA. The application\u0027s configuration file contains parameters that represent passwords in plaintext." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-256" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-143-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-143-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2017-7913", "datePublished": "2017-05-29T16:00:00", "dateReserved": "2017-04-18T00:00:00", "dateUpdated": "2024-08-05T16:19:29.494Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-7510 (GCVE-0-2018-7510)
Vulnerability from cvelistv5
Published
2018-06-06 20:00
Modified
2024-09-16 22:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-256 - UNPROTECTED STORAGE OF CREDENTIALS
Summary
In the web application in BeaconMedaes TotalAlert Scroll Medical Air Systems running software versions prior to 4107600010.23, passwords are presented in plaintext in a file that is accessible without authentication.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ICS-CERT | BeaconMedaes TotalAlert Scroll Medical Air Systems web application |
Version: All versions prior to version 4107600010.23 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:04.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-144-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BeaconMedaes TotalAlert Scroll Medical Air Systems web application", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "All versions prior to version 4107600010.23" } ] } ], "datePublic": "2018-05-24T00:00:00", "descriptions": [ { "lang": "en", "value": "In the web application in BeaconMedaes TotalAlert Scroll Medical Air Systems running software versions prior to 4107600010.23, passwords are presented in plaintext in a file that is accessible without authentication." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "UNPROTECTED STORAGE OF CREDENTIALS CWE-256", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-06T19:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-144-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-05-24T00:00:00", "ID": "CVE-2018-7510", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BeaconMedaes TotalAlert Scroll Medical Air Systems web application", "version": { "version_data": [ { "version_value": "All versions prior to version 4107600010.23" } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the web application in BeaconMedaes TotalAlert Scroll Medical Air Systems running software versions prior to 4107600010.23, passwords are presented in plaintext in a file that is accessible without authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UNPROTECTED STORAGE OF CREDENTIALS CWE-256" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-144-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-144-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-7510", "datePublished": "2018-06-06T20:00:00Z", "dateReserved": "2018-02-26T00:00:00", "dateUpdated": "2024-09-16T22:20:39.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-7515 (GCVE-0-2018-7515)
Vulnerability from cvelistv5
Published
2018-03-21 20:00
Modified
2024-09-17 02:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-256 - UNPROTECTED STORAGE OF CREDENTIALS
Summary
In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ICS-CERT | BeaconMedæs TotalAlert Scroll Medical Air Systems web application |
Version: All versions prior to version 4107600010.23 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:04.117Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103394", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103394" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BeaconMed\u0026#195;\u0026#166;s TotalAlert Scroll Medical Air Systems web application", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "All versions prior to version 4107600010.23" } ] } ], "datePublic": "2018-05-24T00:00:00", "descriptions": [ { "lang": "en", "value": "In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "UNPROTECTED STORAGE OF CREDENTIALS CWE-256", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-02T20:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "103394", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103394" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-05-24T00:00:00", "ID": "CVE-2018-7515", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BeaconMed\u0026#195;\u0026#166;s TotalAlert Scroll Medical Air Systems web application", "version": { "version_data": [ { "version_value": "All versions prior to version 4107600010.23" } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UNPROTECTED STORAGE OF CREDENTIALS CWE-256" } ] } ] }, "references": { "reference_data": [ { "name": "103394", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103394" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-7515", "datePublished": "2018-03-21T20:00:00Z", "dateReserved": "2018-02-26T00:00:00", "dateUpdated": "2024-09-17T02:52:00.046Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-8851 (GCVE-0-2018-8851)
Vulnerability from cvelistv5
Published
2018-07-24 17:00
Modified
2024-09-16 19:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-256 - UNPROTECTED STORAGE OF CREDENTIALS
Summary
Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. The devices store passwords in plaintext, which may allow an attacker with access to the configuration file to log into the SmartServer web user interface.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | Echelon | SmartServer 1 |
Version: all versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:10:45.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SmartServer 1", "vendor": "Echelon", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "SmartServer 2", "vendor": "Echelon", "versions": [ { "status": "affected", "version": "all versions prior to release 4.11.007" } ] }, { "product": "i.LON 100", "vendor": "Echelon", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "i.LON 600", "vendor": "Echelon", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "datePublic": "2018-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. The devices store passwords in plaintext, which may allow an attacker with access to the configuration file to log into the SmartServer web user interface." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "UNPROTECTED STORAGE OF CREDENTIALS CWE-256", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-24T16:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-07-19T00:00:00", "ID": "CVE-2018-8851", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SmartServer 1", "version": { "version_data": [ { "version_value": "all versions" } ] } }, { "product_name": "SmartServer 2", "version": { "version_data": [ { "version_value": "all versions prior to release 4.11.007" } ] } }, { "product_name": "i.LON 100", "version": { "version_data": [ { "version_value": "all versions" } ] } }, { "product_name": "i.LON 600", "version": { "version_data": [ { "version_value": "all versions" } ] } } ] }, "vendor_name": "Echelon" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. The devices store passwords in plaintext, which may allow an attacker with access to the configuration file to log into the SmartServer web user interface." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UNPROTECTED STORAGE OF CREDENTIALS CWE-256" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-8851", "datePublished": "2018-07-24T17:00:00Z", "dateReserved": "2018-03-20T00:00:00", "dateUpdated": "2024-09-16T19:37:04.245Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0032 (GCVE-0-2019-0032)
Vulnerability from cvelistv5
Published
2019-04-10 20:13
Modified
2024-09-16 23:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-256 - Unprotected Storage of Credentials
Summary
A password management issue exists where the Organization authentication username and password were stored in plaintext in log files. A locally authenticated attacker who is able to access these stored plaintext credentials can use them to login to the Organization. Affected products are: Juniper Networks Service Insight versions from 15.1R1, prior to 18.1R1. Service Now versions from 15.1R1, prior to 18.1R1.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Juniper Networks | Service Insight |
Version: 15.1R1 < unspecified Version: unspecified < 18.1R1 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/JSA10921" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/KB27572" }, { "name": "107885", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107885" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Service Insight", "vendor": "Juniper Networks", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "15.1R1", "versionType": "custom" }, { "lessThan": "18.1R1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Service Now", "vendor": "Juniper Networks", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "15.1R1", "versionType": "custom" }, { "lessThan": "18.1R1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-04-10T00:00:00", "descriptions": [ { "lang": "en", "value": "A password management issue exists where the Organization authentication username and password were stored in plaintext in log files. A locally authenticated attacker who is able to access these stored plaintext credentials can use them to login to the Organization. Affected products are: Juniper Networks Service Insight versions from 15.1R1, prior to 18.1R1. Service Now versions from 15.1R1, prior to 18.1R1." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "CWE-256 Unprotected Storage of Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-12T12:06:03", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/JSA10921" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/KB27572" }, { "name": "107885", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107885" } ], "solutions": [ { "lang": "en", "value": "The following Junos Space Service Now and Service Insight releases have been updated to resolve this specific issue:\n18.1R1, and all subsequent releases. \nThese releases of Service Now and Service Insight require at least version 18.4R1 of Junos Space.\n\nNo action is needed to resolve this issue other than upgrading.\n\nExisting log files will roll over as more actions are logged.\n\nTo clear log files manually, login to the server as admin and issue the following commands: \n [root@space ~]# cd /var/log/jboss/servers/server1/\n [root@space server1]#\n [root@space server1]# ls serviceNow.log*\nShould result in output similar to:\n serviceNow.log serviceNow.log.10 serviceNow.log.12 serviceNow.log.14 serviceNow.log.2 serviceNow.log.4 serviceNow.log.6 serviceNow.log.8 serviceNow.log.1 serviceNow.log.11 serviceNow.log.13 serviceNow.log.15 serviceNow.log.3 serviceNow.log.5 serviceNow.log.7 serviceNow.log.9\nNext,\n [root@space server1]# \u003e\u003e serviceNow.log\n [root@space server1]# rm serviceNow.log.*\n \nIf you wish to change the Organization password as a result of this advisory, you must contact JTAC for assistance to properly update the Organization." } ], "source": { "advisory": "JSA10921", "defect": [ "1390749" ], "discovery": "USER" }, "title": "Junos Space Service Now and Service Insight: Organization username and password stored in plaintext in log files.", "workarounds": [ { "lang": "en", "value": "There are no workarounds for this issue.\nTo reduce the risk of exploitation of this issue use access lists or firewall filters to limit access to the device(s) via all means to only trusted administrative networks, hosts and users." } ], "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-04-10T16:00:00.000Z", "ID": "CVE-2019-0032", "STATE": "PUBLIC", "TITLE": "Junos Space Service Now and Service Insight: Organization username and password stored in plaintext in log files." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Service Insight", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "15.1R1" }, { "version_affected": "\u003c", "version_value": "18.1R1" } ] } }, { "product_name": "Service Now", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "15.1R1" }, { "version_affected": "\u003c", "version_value": "18.1R1" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A password management issue exists where the Organization authentication username and password were stored in plaintext in log files. A locally authenticated attacker who is able to access these stored plaintext credentials can use them to login to the Organization. Affected products are: Juniper Networks Service Insight versions from 15.1R1, prior to 18.1R1. Service Now versions from 15.1R1, prior to 18.1R1." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-256 Unprotected Storage of Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10921", "refsource": "CONFIRM", "url": "https://kb.juniper.net/JSA10921" }, { "name": "https://kb.juniper.net/KB27572", "refsource": "MISC", "url": "https://kb.juniper.net/KB27572" }, { "name": "107885", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107885" } ] }, "solution": [ { "lang": "en", "value": "The following Junos Space Service Now and Service Insight releases have been updated to resolve this specific issue:\n18.1R1, and all subsequent releases. \nThese releases of Service Now and Service Insight require at least version 18.4R1 of Junos Space.\n\nNo action is needed to resolve this issue other than upgrading.\n\nExisting log files will roll over as more actions are logged.\n\nTo clear log files manually, login to the server as admin and issue the following commands: \n [root@space ~]# cd /var/log/jboss/servers/server1/\n [root@space server1]#\n [root@space server1]# ls serviceNow.log*\nShould result in output similar to:\n serviceNow.log serviceNow.log.10 serviceNow.log.12 serviceNow.log.14 serviceNow.log.2 serviceNow.log.4 serviceNow.log.6 serviceNow.log.8 serviceNow.log.1 serviceNow.log.11 serviceNow.log.13 serviceNow.log.15 serviceNow.log.3 serviceNow.log.5 serviceNow.log.7 serviceNow.log.9\nNext,\n [root@space server1]# \u003e\u003e serviceNow.log\n [root@space server1]# rm serviceNow.log.*\n \nIf you wish to change the Organization password as a result of this advisory, you must contact JTAC for assistance to properly update the Organization." } ], "source": { "advisory": "JSA10921", "defect": [ "1390749" ], "discovery": "USER" }, "work_around": [ { "lang": "en", "value": "There are no workarounds for this issue.\nTo reduce the risk of exploitation of this issue use access lists or firewall filters to limit access to the device(s) via all means to only trusted administrative networks, hosts and users." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0032", "datePublished": "2019-04-10T20:13:51.164631Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-16T23:21:58.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0072 (GCVE-0-2019-0072)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-16 18:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-256 - Unprotected Storage of Credentials
Summary
An Unprotected Storage of Credentials vulnerability in the identity and access management certificate generation procedure allows a local attacker to gain access to confidential information. This issue affects: Juniper Networks SBR Carrier: 8.4.1 versions prior to 8.4.1R13; 8.5.0 versions prior to 8.5.0R4.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | SBR Carrier |
Version: 8.4.1 < 8.4.1R13 Version: 8.5.0 < 8.5.0R4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10971" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SBR Carrier", "vendor": "Juniper Networks", "versions": [ { "lessThan": "8.4.1R13", "status": "affected", "version": "8.4.1", "versionType": "custom" }, { "lessThan": "8.5.0R4", "status": "affected", "version": "8.5.0", "versionType": "custom" } ] } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "An Unprotected Storage of Credentials vulnerability in the identity and access management certificate generation procedure allows a local attacker to gain access to confidential information. This issue affects: Juniper Networks SBR Carrier: 8.4.1 versions prior to 8.4.1R13; 8.5.0 versions prior to 8.5.0R4." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "CWE-256 Unprotected Storage of Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:18", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10971" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: \n8.4.1R13, 8.5.0R4 and all subsequent releases." } ], "source": { "advisory": "JSA10971", "defect": [ "1358911" ], "discovery": "INTERNAL" }, "title": "SBR Carrier: A vulnerability in the identity and access management certificate generation procedure allows a local attacker to gain access to confidential information.", "workarounds": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0072", "STATE": "PUBLIC", "TITLE": "SBR Carrier: A vulnerability in the identity and access management certificate generation procedure allows a local attacker to gain access to confidential information." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SBR Carrier", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "8.4.1", "version_value": "8.4.1R13" }, { "version_affected": "\u003c", "version_name": "8.5.0", "version_value": "8.5.0R4" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Unprotected Storage of Credentials vulnerability in the identity and access management certificate generation procedure allows a local attacker to gain access to confidential information. This issue affects: Juniper Networks SBR Carrier: 8.4.1 versions prior to 8.4.1R13; 8.5.0 versions prior to 8.5.0R4." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-256 Unprotected Storage of Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10971", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10971" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: \n8.4.1R13, 8.5.0R4 and all subsequent releases." } ], "source": { "advisory": "JSA10971", "defect": [ "1358911" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0072", "datePublished": "2019-10-09T19:26:18.073970Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-16T18:56:06.030Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-10921 (GCVE-0-2019-10921)
Vulnerability from cvelistv5
Published
2019-05-14 19:54
Modified
2024-08-04 22:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-256 - Unprotected Storage of Credentials
Summary
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Unencrypted storage of passwords in the project could allow an attacker with access to port 10005/tcp to obtain passwords of the device. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Siemens | LOGO! 8 BM (incl. SIPLUS variants) |
Version: All versions < V8.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:15.264Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "108382", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108382" }, { "name": "20190529 [SYSS-2019-014]: Siemens LOGO! 8 - Storing Passwords in a Recoverable Format (CWE-257)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/May/74" }, { "name": "20190529 [SYSS-2019-014]: Siemens LOGO! 8 - Storing Passwords in a Recoverable Format (CWE-257)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/May/49" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-542701.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/153124/Siemens-LOGO-8-Recoverable-Password-Format.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LOGO! 8 BM (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V8.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions \u003c V8.3). Unencrypted storage of passwords in the project could allow an attacker with access to port 10005/tcp to obtain passwords of the device. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "CWE-256: Unprotected Storage of Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-14T21:05:17", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "name": "108382", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108382" }, { "name": "20190529 [SYSS-2019-014]: Siemens LOGO! 8 - Storing Passwords in a Recoverable Format (CWE-257)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/May/74" }, { "name": "20190529 [SYSS-2019-014]: Siemens LOGO! 8 - Storing Passwords in a Recoverable Format (CWE-257)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/May/49" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-542701.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/153124/Siemens-LOGO-8-Recoverable-Password-Format.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-10921", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LOGO! 8 BM (incl. SIPLUS variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V8.3" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions \u003c V8.3). Unencrypted storage of passwords in the project could allow an attacker with access to port 10005/tcp to obtain passwords of the device. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-256: Unprotected Storage of Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "108382", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108382" }, { "name": "20190529 [SYSS-2019-014]: Siemens LOGO! 8 - Storing Passwords in a Recoverable Format (CWE-257)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/May/74" }, { "name": "20190529 [SYSS-2019-014]: Siemens LOGO! 8 - Storing Passwords in a Recoverable Format (CWE-257)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/May/49" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-542701.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-542701.pdf" }, { "name": "http://packetstormsecurity.com/files/153124/Siemens-LOGO-8-Recoverable-Password-Format.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/153124/Siemens-LOGO-8-Recoverable-Password-Format.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-10921", "datePublished": "2019-05-14T19:54:48", "dateReserved": "2019-04-08T00:00:00", "dateUpdated": "2024-08-04T22:40:15.264Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-19105 (GCVE-0-2019-19105)
Vulnerability from cvelistv5
Published
2020-04-22 14:35
Modified
2024-08-05 02:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-256 - Unprotected Storage of Credentials
Summary
The backup function in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway saves the current settings and configuration of the application, including credentials of existing user accounts and other configuration's credentials in plaintext.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | ABB | TG/S 3.2 Telephone Gateway |
Version: 2CDG 110 135 R0011 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:09:39.293Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107680A3921\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "TG/S 3.2 Telephone Gateway", "vendor": "ABB", "versions": [ { "status": "affected", "version": "2CDG 110 135 R0011" } ] }, { "product": "6186/11 Telefon-Gateway ", "vendor": "Busch-Jaeger", "versions": [ { "status": "affected", "version": "2CKA006136A0187" } ] } ], "descriptions": [ { "lang": "en", "value": "The backup function in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway saves the current settings and configuration of the application, including credentials of existing user accounts and other configuration\u0027s credentials in plaintext." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "CWE-256 Unprotected Storage of Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-22T14:35:17", "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "shortName": "ABB" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107680A3921\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source": { "discovery": "UNKNOWN" }, "title": "ABB/Busch-Jaeger Telephone Gateway TG/S 3.2 Plaintext storing of credentials", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@ch.abb.com", "ID": "CVE-2019-19105", "STATE": "PUBLIC", "TITLE": "ABB/Busch-Jaeger Telephone Gateway TG/S 3.2 Plaintext storing of credentials" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "TG/S 3.2 Telephone Gateway", "version": { "version_data": [ { "version_affected": "=", "version_value": "2CDG 110 135 R0011" } ] } } ] }, "vendor_name": "ABB" }, { "product": { "product_data": [ { "product_name": "6186/11 Telefon-Gateway ", "version": { "version_data": [ { "version_affected": "=", "version_value": "2CKA006136A0187" } ] } } ] }, "vendor_name": "Busch-Jaeger" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The backup function in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway saves the current settings and configuration of the application, including credentials of existing user accounts and other configuration\u0027s credentials in plaintext." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-256 Unprotected Storage of Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107680A3921\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch", "refsource": "MISC", "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107680A3921\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "assignerShortName": "ABB", "cveId": "CVE-2019-19105", "datePublished": "2020-04-22T14:35:17", "dateReserved": "2019-11-18T00:00:00", "dateUpdated": "2024-08-05T02:09:39.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: Architecture and Design
Description:
- Avoid storing passwords in easily accessible locations.
Mitigation
Phase: Architecture and Design
Description:
- Consider storing cryptographic hashes of passwords as an alternative to storing in plaintext.
Mitigation
Phases:
Description:
- A programmer might attempt to remedy the password management problem by obscuring the password with an encoding function, such as base 64 encoding, but this effort does not adequately protect the password because the encoding can be detected and decoded easily.
No CAPEC attack patterns related to this CWE.