A vulnerability has been identified in OZW672 (All versions < V10.00), OZW772 (All versions < V10.00). Vulnerable versions of OZW Web Server use predictable path names for project files that legitimately authenticated users have created by using the application's export function. By accessing a specific uniform resource locator on the web server, a remote attacker could be able to download a project file without prior authentication. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected system. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system.
References
Link Resource
https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf Vendor Advisory
https://www.us-cert.gov/ics/advisories/icsa-20-042-09 Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: siemens

Published: 2020-02-11T15:36:10

Updated: 2020-03-10T19:16:14

Reserved: 2019-07-18T00:00:00


Link: CVE-2019-13941

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-02-11T16:15:14.897

Modified: 2021-11-01T17:35:54.187


Link: CVE-2019-13941

JSON object: View

cve-icon Redhat Information

No data.

CWE