A vulnerability has been identified in Siveillance Video Client (All versions). In environments where Windows NTLM authentication is enabled the affected client application transmits usernames to the server in cleartext. This could allow an attacker in a privileged network position to obtain valid adminstrator login names and use this information to launch further attacks.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-770698.pdf | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-252-05 | Third Party Advisory US Government Resource |
https://cert-portal.siemens.com/productcert/pdf/ssa-770698.pdf | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-252-05 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 05:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-770698.pdf - Vendor Advisory | |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-20-252-05 - Third Party Advisory, US Government Resource |
Information
Published : 2020-09-09 19:15
Updated : 2024-11-21 05:06
NVD link : CVE-2020-15785
Mitre link : CVE-2020-15785
CVE.ORG link : CVE-2020-15785
JSON object : View
Products Affected
siemens
- siveillance_video_client
CWE
CWE-319
Cleartext Transmission of Sensitive Information