CVE-2019-14482

AdRem NetCrunch 10.6.0.4587 has a hardcoded SSL private key vulnerability in the NetCrunch web client. The same hardcoded SSL private key is used across different customers' installations when no other SSL certificate is installed, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:adremsoft:netcrunch:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:26

Type Values Removed Values Added
References () https://compass-security.com/fileadmin/Research/Advisories/2020-16_CSNC-2019-017_AdRem_NetCrunch_Hardcoded_SSL_Private_Key.txt - Exploit, Technical Description, Third Party Advisory () https://compass-security.com/fileadmin/Research/Advisories/2020-16_CSNC-2019-017_AdRem_NetCrunch_Hardcoded_SSL_Private_Key.txt - Exploit, Technical Description, Third Party Advisory
References () https://www.adremsoft.com/support/ - Product () https://www.adremsoft.com/support/ - Product

Information

Published : 2020-12-16 16:15

Updated : 2024-11-21 04:26


NVD link : CVE-2019-14482

Mitre link : CVE-2019-14482

CVE.ORG link : CVE-2019-14482


JSON object : View

Products Affected

adremsoft

  • netcrunch
CWE
CWE-798

Use of Hard-coded Credentials