Prima Systems FlexAir, Versions 2.3.38 and prior. The application generates database backup files with a predictable name, and an attacker can use brute force to identify the database backup file name. A malicious actor can exploit this issue to download the database file and disclose login information, which can allow the attacker to bypass authentication and have full access to the system.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/155262/Prima-FlexAir-Access-Control-2.3.35-Database-Backup-Predictable-Name.html | Exploit Third Party Advisory VDB Entry |
https://applied-risk.com/labs/advisories | Third Party Advisory |
https://www.applied-risk.com/resources/ar-2019-007 | Third Party Advisory |
https://www.us-cert.gov/ics/advisories/icsa-19-211-02 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-01T18:22:21
Updated: 2019-11-12T20:07:01
Reserved: 2019-02-09T00:00:00
Link: CVE-2019-7667
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-01T19:15:11.570
Modified: 2022-10-21T19:41:33.827
Link: CVE-2019-7667
JSON object: View
Redhat Information
No data.
CWE