Incorrect Access Control in Safescan Timemoto TM-616 and TA-8000 series allows remote attackers to read any file via the administrative API.
References
Link | Resource |
---|---|
https://github.com/ProCheckUp/SafeScan | Exploit Third Party Advisory |
https://procheckup.com/blogs/posts/2020/february/remote-code-execution-on-biometric-iot-devices/ | Exploit Third Party Advisory |
https://support.timemoto.com/en/s/safescan-time-clock-systems/a/firmware-update-7-dot-03-dot-100-ta8000-14 |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
No history.
Information
Published : 2020-03-02 16:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-12183
Mitre link : CVE-2019-12183
CVE.ORG link : CVE-2019-12183
JSON object : View
Products Affected
safescan
- ta-8035_firmware
- timemoto_tm-616_firmware
- ta-8015_firmware
- ta-8020
- ta-8025
- ta-8030_firmware
- timemoto_tm-616
- ta-8035
- ta-8015
- ta-8025_firmware
- ta-8030
- ta-8020_firmware
- ta-8010_firmware
- ta-8010
CWE
CWE-269
Improper Privilege Management