Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-12254
Analyzed
More InfoOfficial Page
Source-info@cert.vde.com
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2022 | 18:15
Updated At-16 May, 2022 | 18:40

In multiple Tecson Tankspion and GOKs SmartBox 4 products the affected application doesn't properly restrict access to an endpoint that is responsible for saving settings, to a unauthenticated user with limited access rights. Based on the lack of adequately implemented access-control rules, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to change the application settings without authenticating at all, which violates originally laid ACL rules.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

gok
gok
>>smartbox_4_lan>>-
cpe:2.3:h:gok:smartbox_4_lan:-:*:*:*:*:*:*:*
gok
gok
>>smartbox_4_lan_firmware>>*
cpe:2.3:o:gok:smartbox_4_lan_firmware:*:*:*:*:*:*:*:*
gok
gok
>>smartbox_4_lan_pro>>-
cpe:2.3:h:gok:smartbox_4_lan_pro:-:*:*:*:*:*:*:*
gok
gok
>>smartbox_4_lan_pro_firmware>>*
cpe:2.3:o:gok:smartbox_4_lan_pro_firmware:*:*:*:*:*:*:*:*
tecson
tecson
>>lx-q-net>>-
cpe:2.3:h:tecson:lx-q-net:-:*:*:*:*:*:*:*
tecson
tecson
>>lx-q-net_firmware>>*
cpe:2.3:o:tecson:lx-q-net_firmware:*:*:*:*:*:*:*:*
tecson
tecson
>>lx-net>>-
cpe:2.3:h:tecson:lx-net:-:*:*:*:*:*:*:*
tecson
tecson
>>lx-net_firmware>>*
cpe:2.3:o:tecson:lx-net_firmware:*:*:*:*:*:*:*:*
tecson
tecson
>>e-litro_net>>-
cpe:2.3:h:tecson:e-litro_net:-:*:*:*:*:*:*:*
tecson
tecson
>>e-litro_net_firmware>>*
cpe:2.3:o:tecson:e-litro_net_firmware:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primaryinfo@cert.vde.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://cert.vde.com/en/advisories/VDE-2019-012/info@cert.vde.com
Third Party Advisory
Change History
0Changes found

Details not found