Логотип exploitDog
bind:CVE-2019-13929
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-13929

Количество 3

Количество 3

nvd логотип

CVE-2019-13929

больше 6 лет назад

A vulnerability has been identified in SIMATIC IT UADM (All versions < V1.3). An authenticated remote attacker with network access to port 1434/tcp of SIMATIC IT UADM could potentially recover a password that can be used to gain read and write access to the related TeamCenter station. The security vulnerability could be exploited only if the attacker is authenticated. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-8r46-6p4v-4rq3

больше 3 лет назад

A vulnerability has been identified in SIMATIC IT UADM (All versions < V1.3). An authenticated remote attacker with network access to port 1434/tcp of SIMATIC IT UADM could potentially recover a password that can be used to gain read and write access to the related TeamCenter station. The security vulnerability could be exploited only if the attacker is authenticated. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.

EPSS: Низкий
fstec логотип

BDU:2019-04214

больше 6 лет назад

Уязвимость программного обеспечения SIMATIC IT UADM, связанная с предсказуемым ключом шифрования, позволяющая нарушителю восстановить пароль и получить доступ к станции TeamCenter

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-13929

A vulnerability has been identified in SIMATIC IT UADM (All versions < V1.3). An authenticated remote attacker with network access to port 1434/tcp of SIMATIC IT UADM could potentially recover a password that can be used to gain read and write access to the related TeamCenter station. The security vulnerability could be exploited only if the attacker is authenticated. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.

CVSS3: 6.5
0%
Низкий
больше 6 лет назад
github логотип
GHSA-8r46-6p4v-4rq3

A vulnerability has been identified in SIMATIC IT UADM (All versions < V1.3). An authenticated remote attacker with network access to port 1434/tcp of SIMATIC IT UADM could potentially recover a password that can be used to gain read and write access to the related TeamCenter station. The security vulnerability could be exploited only if the attacker is authenticated. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-04214

Уязвимость программного обеспечения SIMATIC IT UADM, связанная с предсказуемым ключом шифрования, позволяющая нарушителю восстановить пароль и получить доступ к станции TeamCenter

CVSS3: 6.8
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу