Insufficient session validation in the service API for Intel(R) RWC3 version 4.186 and before may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/108780 | Broken Link Third Party Advisory VDB Entry |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/108780 | Broken Link Third Party Advisory VDB Entry |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/108780 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html - Patch, Vendor Advisory |
Information
Published : 2019-06-13 16:29
Updated : 2024-11-21 04:20
NVD link : CVE-2019-11119
Mitre link : CVE-2019-11119
CVE.ORG link : CVE-2019-11119
JSON object : View
Products Affected
intel
- raid_web_console_3
CWE