CVE-2019-7667

Prima Systems FlexAir, Versions 2.3.38 and prior. The application generates database backup files with a predictable name, and an attacker can use brute force to identify the database backup file name. A malicious actor can exploit this issue to download the database file and disclose login information, which can allow the attacker to bypass authentication and have full access to the system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:primasystems:flexair:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:48

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/155262/Prima-FlexAir-Access-Control-2.3.35-Database-Backup-Predictable-Name.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/155262/Prima-FlexAir-Access-Control-2.3.35-Database-Backup-Predictable-Name.html - Exploit, Third Party Advisory, VDB Entry
References () https://applied-risk.com/labs/advisories - Third Party Advisory () https://applied-risk.com/labs/advisories - Third Party Advisory
References () https://www.applied-risk.com/resources/ar-2019-007 - Third Party Advisory () https://www.applied-risk.com/resources/ar-2019-007 - Third Party Advisory
References () https://www.us-cert.gov/ics/advisories/icsa-19-211-02 - Third Party Advisory, US Government Resource () https://www.us-cert.gov/ics/advisories/icsa-19-211-02 - Third Party Advisory, US Government Resource

Information

Published : 2019-07-01 19:15

Updated : 2024-11-21 04:48


NVD link : CVE-2019-7667

Mitre link : CVE-2019-7667

CVE.ORG link : CVE-2019-7667


JSON object : View

Products Affected

primasystems

  • flexair
CWE
CWE-330

Use of Insufficiently Random Values