5.3
CVE-2019-8282
- EPSS 0.13%
- Veröffentlicht 07.06.2019 15:29:01
- Zuletzt bearbeitet 21.11.2024 04:49:38
- Quelle vulnerability@kaspersky.com
- CVE-Watchlists
- Unerledigt
Gemalto Admin Control Center, all versions prior to 7.92, uses cleartext HTTP to communicate with www3.safenet-inc.com to obtain language packs. This allows attacker to do man-in-the-middle (MITM) attack and replace original language pack by malicious one.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Gemalto ≫ Sentinel Ldk Version < 7.92
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.13% | 0.289 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 1.6 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
|
| nvd@nist.gov | 2.6 | 4.9 | 2.9 |
AV:N/AC:H/Au:N/C:N/I:P/A:N
|
CWE-300 Channel Accessible by Non-Endpoint
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.
CWE-346 Origin Validation Error
The product does not properly verify that the source of data or communication is valid.