cvelist/2019/3xxx/CVE-2019-3910.json

62 lines
2.0 KiB
JSON
Raw Normal View History

2019-01-03 15:04:29 -05:00
{
2019-03-18 03:16:00 +00:00
"CVE_data_meta": {
"ASSIGNER": "vulnreport@tenable.com",
"ID": "CVE-2019-3910",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Crestron AM-100 Before 1.6.0.2",
"version": {
"version_data": [
{
"version_value": "Crestron AM-100 Before 1.6.0.2"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2019-01-18 13:04:17 -05:00
{
2019-03-18 03:16:00 +00:00
"lang": "eng",
"value": "Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device."
2019-01-18 13:04:17 -05:00
}
2019-03-18 03:16:00 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Authentication Bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.tenable.com/security/research/tra-2019-02",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2019-02"
}
]
}
}