Password disclosure in the web interface on socomec DIRIS A-40 devices before 48250501 allows a remote attacker to get full access to a device via the /password.jsn URI.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154764/Socomec-DIRIS-A-40-Password-Disclosure.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Oct/10 | Mailing List Third Party Advisory |
https://www.socomec.com/single-circuit-multifunction-meters_en.html | Product |
http://packetstormsecurity.com/files/154764/Socomec-DIRIS-A-40-Password-Disclosure.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Oct/10 | Mailing List Third Party Advisory |
https://www.socomec.com/single-circuit-multifunction-meters_en.html | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/154764/Socomec-DIRIS-A-40-Password-Disclosure.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2019/Oct/10 - Mailing List, Third Party Advisory | |
References | () https://www.socomec.com/single-circuit-multifunction-meters_en.html - Product |
Information
Published : 2019-10-09 16:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15859
Mitre link : CVE-2019-15859
CVE.ORG link : CVE-2019-15859
JSON object : View
Products Affected
socomec
- diris_a-40
- diris_a-40_firmware
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor