Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU23437
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-16674
CWE-ID:
CWE-341 - Predictable from Observable State
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to admin password.
The vulnerability exists due authentication information used in a cookie is predictable. A remote attacker can compromise the admin password when captured on the network.
Mitigation
Install updates from vendor's website.
Vulnerable software versionsIE-SW-VL05M-5TX: 3.6.6
IE-SW-VL05MT-5TX: 3.6.6
IE-SW-VL05M-3TX-2SC: 3.6.6
IE-SW-VL05MT-3TX-2SC: 3.6.6
IE-SW-VL05M-3TX-2ST: 3.6.6
IE-SW-VL05MT-3TX-2ST: 3.6.6
IE-SW-VL08MT-8TX: 3.5.2
IE-SW-VL08MT-5TX-3SC: 3.5.2
IE-SW-VL08MT-5TX-1SC-2SCS: 3.5.2
IE-SW-VL08MT-6TX-2ST: 3.5.2
IE-SW-VL08MT-6TX-2SC: 3.5.2
IE-SW-VL08MT-6TX-2SCS: 3.5.2
IE-SW-PL08M-8TX: 3.3.8
IE-SW-PL08MT-8TX: 3.3.8
IE-SW-PL08M-6TX-2SC: 3.3.8
IE-SW-PL08MT-6TX-2SC: 3.3.8
IE-SW-PL08M-6TX-2ST: 3.3.8
IE-SW-PL08MT-6TX-2ST: 3.3.8
IE-SW-PL08M-6TX-2SCS: 3.3.8
IE-SW-PL08MT-6TX-2SCS: 3.3.8
IE-SW-PL10M-3GT-7TX: 3.3.16
IE-SW-PL10MT-3GT-7TX: 3.3.16
IE-SW-PL10M-1GT-2GS-7TX: 3.3.16
IE-SW-PL10MT-1GT-2GS-7TX: 3.3.16
IE-SW-PL16M-16TX: 3.4.2
IE-SW-PL16MT-16TX: 3.4.2
IE-SW-PL16M-14TX-2SC: 3.4.2
IE-SW-PL16MT-14TX-2SC: 3.4.2
IE-SW-PL16M-14TX-2ST: 3.4.2
IE-SW-PL16MT-14TX-2ST: 3.4.2
IE-SW-PL18M-2GC-16TX: 3.4.4
IE-SW-PL18MT-2GC-16TX: 3.4.4
IE-SW-PL18M-2GC14TX2SC: 3.4.4
IE-SW-PL18MT-2GC14TX2SC: 3.4.4
IE-SW-PL18M-2GC14TX2ST: 3.4.4
IE-SW-PL18MT-2GC14TX2ST: 3.4.4
IE-SW-PL18M-2GC14TX2SCS: 3.4.4
IE-SW-PL18MT-2GC14TX2SCS: 3.4.4
IE-SW-PL09M-5GC-4GT: 3.3.4
IE-SW-PL09MT-5GC-4GT: 3.3.4
External linkshttp://cert.vde.com/en-us/advisories/vde-2019-018
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU23436
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-16673
CWE-ID:
CWE-256 - Unprotected Storage of Credentials
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to other users' credentials.
The vulnerability exists due to application stored credentials in plain text in a configuration file on the system. A remote attacker with access to the device can view contents of the configuration file and gain access to passwords for 3rd party integration.
Mitigation
Install updates from vendor's website.
Vulnerable software versionsIE-SW-VL05M-5TX: 3.6.6
IE-SW-VL05MT-5TX: 3.6.6
IE-SW-VL05M-3TX-2SC: 3.6.6
IE-SW-VL05MT-3TX-2SC: 3.6.6
IE-SW-VL05M-3TX-2ST: 3.6.6
IE-SW-VL05MT-3TX-2ST: 3.6.6
IE-SW-VL08MT-8TX: 3.5.2
IE-SW-VL08MT-5TX-3SC: 3.5.2
IE-SW-VL08MT-5TX-1SC-2SCS: 3.5.2
IE-SW-VL08MT-6TX-2ST: 3.5.2
IE-SW-VL08MT-6TX-2SC: 3.5.2
IE-SW-VL08MT-6TX-2SCS: 3.5.2
IE-SW-PL08M-8TX: 3.3.8
IE-SW-PL08MT-8TX: 3.3.8
IE-SW-PL08M-6TX-2SC: 3.3.8
IE-SW-PL08MT-6TX-2SC: 3.3.8
IE-SW-PL08M-6TX-2ST: 3.3.8
IE-SW-PL08MT-6TX-2ST: 3.3.8
IE-SW-PL08M-6TX-2SCS: 3.3.8
IE-SW-PL08MT-6TX-2SCS: 3.3.8
IE-SW-PL10M-3GT-7TX: 3.3.16
IE-SW-PL10MT-3GT-7TX: 3.3.16
IE-SW-PL10M-1GT-2GS-7TX: 3.3.16
IE-SW-PL10MT-1GT-2GS-7TX: 3.3.16
IE-SW-PL16M-16TX: 3.4.2
IE-SW-PL16MT-16TX: 3.4.2
IE-SW-PL16M-14TX-2SC: 3.4.2
IE-SW-PL16MT-14TX-2SC: 3.4.2
IE-SW-PL16M-14TX-2ST: 3.4.2
IE-SW-PL16MT-14TX-2ST: 3.4.2
IE-SW-PL18M-2GC-16TX: 3.4.4
IE-SW-PL18MT-2GC-16TX: 3.4.4
IE-SW-PL18M-2GC14TX2SC: 3.4.4
IE-SW-PL18MT-2GC14TX2SC: 3.4.4
IE-SW-PL18M-2GC14TX2ST: 3.4.4
IE-SW-PL18MT-2GC14TX2ST: 3.4.4
IE-SW-PL18M-2GC14TX2SCS: 3.4.4
IE-SW-PL18MT-2GC14TX2SCS: 3.4.4
IE-SW-PL09M-5GC-4GT: 3.3.4
IE-SW-PL09MT-5GC-4GT: 3.3.4
External linkshttp://cert.vde.com/en-us/advisories/vde-2019-018
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU23435
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-16672
CWE-ID:
CWE-319 - Cleartext Transmission of Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker with ability to intercept network traffic can gain access to credentials data.
Mitigation
Install updates from vendor's website.
Vulnerable software versionsIE-SW-VL05M-5TX: 3.6.6
IE-SW-VL05MT-5TX: 3.6.6
IE-SW-VL05M-3TX-2SC: 3.6.6
IE-SW-VL05MT-3TX-2SC: 3.6.6
IE-SW-VL05M-3TX-2ST: 3.6.6
IE-SW-VL05MT-3TX-2ST: 3.6.6
IE-SW-VL08MT-8TX: 3.5.2
IE-SW-VL08MT-5TX-3SC: 3.5.2
IE-SW-VL08MT-5TX-1SC-2SCS: 3.5.2
IE-SW-VL08MT-6TX-2ST: 3.5.2
IE-SW-VL08MT-6TX-2SC: 3.5.2
IE-SW-VL08MT-6TX-2SCS: 3.5.2
IE-SW-PL08M-8TX: 3.3.8
IE-SW-PL08MT-8TX: 3.3.8
IE-SW-PL08M-6TX-2SC: 3.3.8
IE-SW-PL08MT-6TX-2SC: 3.3.8
IE-SW-PL08M-6TX-2ST: 3.3.8
IE-SW-PL08MT-6TX-2ST: 3.3.8
IE-SW-PL08M-6TX-2SCS: 3.3.8
IE-SW-PL08MT-6TX-2SCS: 3.3.8
IE-SW-PL10M-3GT-7TX: 3.3.16
IE-SW-PL10MT-3GT-7TX: 3.3.16
IE-SW-PL10M-1GT-2GS-7TX: 3.3.16
IE-SW-PL10MT-1GT-2GS-7TX: 3.3.16
IE-SW-PL16M-16TX: 3.4.2
IE-SW-PL16MT-16TX: 3.4.2
IE-SW-PL16M-14TX-2SC: 3.4.2
IE-SW-PL16MT-14TX-2SC: 3.4.2
IE-SW-PL16M-14TX-2ST: 3.4.2
IE-SW-PL16MT-14TX-2ST: 3.4.2
IE-SW-PL18M-2GC-16TX: 3.4.4
IE-SW-PL18MT-2GC-16TX: 3.4.4
IE-SW-PL18M-2GC14TX2SC: 3.4.4
IE-SW-PL18MT-2GC14TX2SC: 3.4.4
IE-SW-PL18M-2GC14TX2ST: 3.4.4
IE-SW-PL18MT-2GC14TX2ST: 3.4.4
IE-SW-PL18M-2GC14TX2SCS: 3.4.4
IE-SW-PL18MT-2GC14TX2SCS: 3.4.4
IE-SW-PL09M-5GC-4GT: 3.3.4
IE-SW-PL09MT-5GC-4GT: 3.3.4
External linkshttp://cert.vde.com/en-us/advisories/vde-2019-018
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU23434
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-16671
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation. A remote authenticated attacker can send a specially crafted packet, trigger resource exhaustion and cause a denial of service condition on the target system.
Mitigation
Install updates from vendor's website.
Vulnerable software versionsIE-SW-VL05M-5TX: 3.6.6
IE-SW-VL05MT-5TX: 3.6.6
IE-SW-VL05M-3TX-2SC: 3.6.6
IE-SW-VL05MT-3TX-2SC: 3.6.6
IE-SW-VL05M-3TX-2ST: 3.6.6
IE-SW-VL05MT-3TX-2ST: 3.6.6
IE-SW-VL08MT-8TX: 3.5.2
IE-SW-VL08MT-5TX-3SC: 3.5.2
IE-SW-VL08MT-5TX-1SC-2SCS: 3.5.2
IE-SW-VL08MT-6TX-2ST: 3.5.2
IE-SW-VL08MT-6TX-2SC: 3.5.2
IE-SW-VL08MT-6TX-2SCS: 3.5.2
IE-SW-PL08M-8TX: 3.3.8
IE-SW-PL08MT-8TX: 3.3.8
IE-SW-PL08M-6TX-2SC: 3.3.8
IE-SW-PL08MT-6TX-2SC: 3.3.8
IE-SW-PL08M-6TX-2ST: 3.3.8
IE-SW-PL08MT-6TX-2ST: 3.3.8
IE-SW-PL08M-6TX-2SCS: 3.3.8
IE-SW-PL08MT-6TX-2SCS: 3.3.8
IE-SW-PL10M-3GT-7TX: 3.3.16
IE-SW-PL10MT-3GT-7TX: 3.3.16
IE-SW-PL10M-1GT-2GS-7TX: 3.3.16
IE-SW-PL10MT-1GT-2GS-7TX: 3.3.16
IE-SW-PL16M-16TX: 3.4.2
IE-SW-PL16MT-16TX: 3.4.2
IE-SW-PL16M-14TX-2SC: 3.4.2
IE-SW-PL16MT-14TX-2SC: 3.4.2
IE-SW-PL16M-14TX-2ST: 3.4.2
IE-SW-PL16MT-14TX-2ST: 3.4.2
IE-SW-PL18M-2GC-16TX: 3.4.4
IE-SW-PL18MT-2GC-16TX: 3.4.4
IE-SW-PL18M-2GC14TX2SC: 3.4.4
IE-SW-PL18MT-2GC14TX2SC: 3.4.4
IE-SW-PL18M-2GC14TX2ST: 3.4.4
IE-SW-PL18MT-2GC14TX2ST: 3.4.4
IE-SW-PL18M-2GC14TX2SCS: 3.4.4
IE-SW-PL18MT-2GC14TX2SCS: 3.4.4
IE-SW-PL09M-5GC-4GT: 3.3.4
IE-SW-PL09MT-5GC-4GT: 3.3.4
External linkshttp://cert.vde.com/en-us/advisories/vde-2019-018
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU23433
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-16670
CWE-ID:
CWE-307 - Improper Restriction of Excessive Authentication Attempts
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to the system.
The vulnerability exists due to the authentication mechanism has no brute-force prevention. A remote attacker can launch a brute-force authentication attack and gain access to the target system.
Mitigation
Install updates from vendor's website.
Vulnerable software versionsIE-SW-VL05M-5TX: 3.6.6
IE-SW-VL05MT-5TX: 3.6.6
IE-SW-VL05M-3TX-2SC: 3.6.6
IE-SW-VL05MT-3TX-2SC: 3.6.6
IE-SW-VL05M-3TX-2ST: 3.6.6
IE-SW-VL05MT-3TX-2ST: 3.6.6
IE-SW-VL08MT-8TX: 3.5.2
IE-SW-VL08MT-5TX-3SC: 3.5.2
IE-SW-VL08MT-5TX-1SC-2SCS: 3.5.2
IE-SW-VL08MT-6TX-2ST: 3.5.2
IE-SW-VL08MT-6TX-2SC: 3.5.2
IE-SW-VL08MT-6TX-2SCS: 3.5.2
IE-SW-PL08M-8TX: 3.3.8
IE-SW-PL08MT-8TX: 3.3.8
IE-SW-PL08M-6TX-2SC: 3.3.8
IE-SW-PL08MT-6TX-2SC: 3.3.8
IE-SW-PL08M-6TX-2ST: 3.3.8
IE-SW-PL08MT-6TX-2ST: 3.3.8
IE-SW-PL08M-6TX-2SCS: 3.3.8
IE-SW-PL08MT-6TX-2SCS: 3.3.8
IE-SW-PL10M-3GT-7TX: 3.3.16
IE-SW-PL10MT-3GT-7TX: 3.3.16
IE-SW-PL10M-1GT-2GS-7TX: 3.3.16
IE-SW-PL10MT-1GT-2GS-7TX: 3.3.16
IE-SW-PL16M-16TX: 3.4.2
IE-SW-PL16MT-16TX: 3.4.2
IE-SW-PL16M-14TX-2SC: 3.4.2
IE-SW-PL16MT-14TX-2SC: 3.4.2
IE-SW-PL16M-14TX-2ST: 3.4.2
IE-SW-PL16MT-14TX-2ST: 3.4.2
IE-SW-PL18M-2GC-16TX: 3.4.4
IE-SW-PL18MT-2GC-16TX: 3.4.4
IE-SW-PL18M-2GC14TX2SC: 3.4.4
IE-SW-PL18MT-2GC14TX2SC: 3.4.4
IE-SW-PL18M-2GC14TX2ST: 3.4.4
IE-SW-PL18MT-2GC14TX2ST: 3.4.4
IE-SW-PL18M-2GC14TX2SCS: 3.4.4
IE-SW-PL18MT-2GC14TX2SCS: 3.4.4
IE-SW-PL09M-5GC-4GT: 3.3.4
IE-SW-PL09MT-5GC-4GT: 3.3.4
External linkshttp://cert.vde.com/en-us/advisories/vde-2019-018
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.