Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on May 19th, 2019 📆 | 7397 Views ⚑

0

IBM Cloud Private Kubernetes API Server 2.1.0/3.1.0/3.1.1/3.1.2 HTTP Proxy unknown vulnerability


Powered by iSpeech

CVSS Meta Temp Score Current Exploit Price (≈)
5.5 $5k-$25k

A vulnerability has been found in IBM Cloud Private Kubernetes API Server 2.1.0/3.1.0/3.1.1/3.1.2 (Cloud Software) and classified as critical. This vulnerability affects a functionality of the component HTTP Proxy Handler. The impact remains unknown.

The weakness was published 05/17/2019. The advisory is shared for download at exchange.xforce.ibmcloud.com. This vulnerability was named CVE-2019-4119 since 01/03/2019. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $5k-$25k (estimation calculated on 05/18/2019).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Vendor

Name

VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.5
VulDB Vector: ?
VulDB Reliability: ?

VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Unknown
Local: Yes
Remote: No

Availability: ?
Status: Not defined





Price Prediction: ?
Current Price Estimation: ?


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: no mitigation known
0-Day Time: ?01/03/2019 CVE assigned
05/17/2019 +134 days Advisory disclosed
05/18/2019 +1 days VulDB entry created
05/18/2019 +0 days VulDB last updateAdvisory: exchange.xforce.ibmcloud.com
Confirmation: ?

CVE: CVE-2019-4119 (?)

Created: 05/18/2019 09:31 AM
Complete: ?

Comments

No comments yet. Please log in to comment.

Use the official API to access entries easily!

https://vuldb.com/?id.135220

Tagged with:



Comments are closed.