9.1
CVE-2019-17218
- EPSS 0.15%
- Veröffentlicht 06.10.2019 16:15:10
- Zuletzt bearbeitet 21.11.2024 04:31:53
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. By default, the communication to the web service is unencrypted via http. An attacker is able to intercept and sniff communication to the web service.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Vzug ≫ Combi-stream Mslq Firmware Version < ethernet_r07
Vzug ≫ Combi-stream Mslq Firmware Version < wlan_r05
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.15% | 0.318 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-319 Cleartext Transmission of Sensitive Information
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.