CVE-2018-19878
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered on Teltonika RTU950 R_31.04.89 devices. The application allows a user to login without limitation. For every successful login request, the application saves a session. A user can re-login without logging out, causing the application to store the session in memory. Exploitation of this vulnerability will increase memory use and consume free space.
Se detecto un problema en los dispositivos Teltonika RTU950 R_31.04.89. La aplicación permite a un usuario iniciar sesión sin limitación. Para cada solicitud de inicio de sesión exitosa, la aplicación guarda una sesión. Un usuario puede volver a iniciar sesión sin cerrar sesión, lo que hace que la aplicación almacene la sesión en la memoria. La explotación de esta vulnerabilidad aumentará el uso de la memoria y consumirá espacio libre.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-12-05 CVE Reserved
- 2019-06-19 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://www.triadsec.com | Not Applicable | |
https://www.triadsec.com/CVE-2018-19878.pdf | Broken Link |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Teltonika Search vendor "Teltonika" | Rut950 Firmware Search vendor "Teltonika" for product "Rut950 Firmware" | r_31.04.89 Search vendor "Teltonika" for product "Rut950 Firmware" and version "r_31.04.89" | - |
Affected
| in | Teltonika Search vendor "Teltonika" | Rut950 Search vendor "Teltonika" for product "Rut950" | - | - |
Safe
|