CVE-2019-18231
 
Severity Score
7.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Advantech Spectre RT ERT351 Versions 5.1.3 and prior logins and passwords are transmitted in clear text form, which may allow an attacker to intercept the request.
Advantech Spectre RT ERT351 Versiones 5.1.3 y anteriores, los inicios de sesión y contraseñas son transmitidos en forma de texto sin cifrar, que puede permitir a un atacante interceptar la petición
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2019-10-22 CVE Reserved
- 2021-03-17 CVE Published
- 2023-12-01 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-319: Cleartext Transmission of Sensitive Information
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-054-03 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Advantech Search vendor "Advantech" | Spectre Rt Ert351 Firmware Search vendor "Advantech" for product "Spectre Rt Ert351 Firmware" | <= 5.1.3 Search vendor "Advantech" for product "Spectre Rt Ert351 Firmware" and version " <= 5.1.3" | - |
Affected
| in | Advantech Search vendor "Advantech" | Spectre Rt Ert351 Search vendor "Advantech" for product "Spectre Rt Ert351" | - | - |
Safe
|