CVE-2019-17393
Tomedo Server 1.7.3 Information Disclosure / Weak Cryptography
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and discover the username and password.
El Customer's Tomedo Server en la versión 1.7.3, se comunica con el Vendor Tomedo Server por medio de HTTP (en texto sin cifrar) que puede ser rastreado por actores no autorizados. La autenticación básica es usada para la autenticación, haciendo posible la decodificación base64 de las credenciales rastreadas y detectar el nombre de usuario y la contraseña.
Tomedo Server version 1.7.3 suffers from using weak cryptography for passwords and cleartext transmission of sensitive information vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-10-09 CVE Reserved
- 2019-10-16 CVE Published
- 2019-10-16 First Exploit
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-319: Cleartext Transmission of Sensitive Information
- CWE-522: Insufficiently Protected Credentials
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/154873/Tomedo-Server-1.7.3-Information-Disclosure-Weak-Cryptography.html | Third Party Advisory |
|
http://seclists.org/fulldisclosure/2019/Oct/33 | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/154873 | 2019-10-16 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|