Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mwpm-ch75-7qqj

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A vulnerability has been identified in SPPA-T3000 Application Server (All versions). The RMI communication between the client and the Application Server is unencrypted. An attacker with access to the communication channel can read credentials of a valid user. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

A vulnerability has been identified in SPPA-T3000 Application Server (All versions). The RMI communication between the client and the Application Server is unencrypted. An attacker with access to the communication channel can read credentials of a valid user. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

EPSS

Процентиль: 39%
0.00176
Низкий

Дефекты

CWE-319

Связанные уязвимости

CVSS3: 5.9
nvd
около 6 лет назад

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). The RMI communication between the client and the Application Server is unencrypted. An attacker with access to the communication channel can read credentials of a valid user. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

CVSS3: 5.3
fstec
около 6 лет назад

Уязвимость сервера приложений системы управления Siemens SPPA-T3000, позволяющая нарушителю получить доступ к конфиденциальной информации

EPSS

Процентиль: 39%
0.00176
Низкий

Дефекты

CWE-319