Advantech Spectre RT ERT351 Versions 5.1.3 and prior logins and passwords are transmitted in clear text form, which may allow an attacker to intercept the request.
References
Link | Resource |
---|---|
https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-054-03 | Third Party Advisory US Government Resource |
https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-054-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf - Vendor Advisory | |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-054-03 - Third Party Advisory, US Government Resource |
Information
Published : 2021-03-17 19:15
Updated : 2024-11-21 04:32
NVD link : CVE-2019-18231
Mitre link : CVE-2019-18231
CVE.ORG link : CVE-2019-18231
JSON object : View
Products Affected
advantech
- spectre_rt_ert351_firmware
- spectre_rt_ert351
CWE
CWE-319
Cleartext Transmission of Sensitive Information