Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on April 24th, 2019 📆 | 6953 Views ⚑

0

Dentsply Sirona Sidexis up to 4.2 Application Server Default Admin Password weak authentication


TTS

CVSS Meta Temp Score Current Exploit Price (≈)
5.5 $0-$5k

A vulnerability was found in Dentsply Sirona Sidexis up to 4.2. It has been declared as critical. This vulnerability affects a code block of the component Application Server. The manipulation with an unknown input leads to a weak authentication vulnerability (Default Admin Password). The CWE definition for the vulnerability is CWE-259. As an impact it is known to affect confidentiality, integrity, and availability.

The weakness was presented 04/24/2019. This vulnerability was named CVE-2019-11081 since 04/10/2019. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 04/24/2019).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Vendor

Name

VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.5
VulDB Vector: ?
VulDB Reliability: ?

VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Weak authentication / Default Admin Password (CWE-259)
Local: Yes
Remote: No





Availability: ?
Status: Not defined

Price Prediction: ?
Current Price Estimation: ?


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: no mitigation known
0-Day Time: ?04/10/2019 CVE assigned
04/24/2019 +14 days Advisory disclosed
04/24/2019 +0 days VulDB entry created
04/24/2019 +0 days VulDB last updateCVE: CVE-2019-11081 (?)Created: 04/24/2019 09:07 PM
Complete: ?

See the underground prices here!

https://vuldb.com/?id.134008

Tagged with:



Comments are closed.