CVE-2019-20049
CRITICAL
9,8
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH
10,0
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete
Description
AI Translation Available
An issue was discovered on Alcatel-Lucent OmniVista 4760 devices. A remote unauthenticated attacker can chain a directory traversal (which helps to bypass authentication) with an insecure file upload to achieve Remote Code Execution as SYSTEM. The directory traversal is in the __construct() whereas the insecure file upload is in SetSkinImages().
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,2554
Percentile
1,0th
Updated
EPSS Score Trend (Last 90 Days)
Application
Omnivista 4760 by Al-Enterprise
CPE Identifier
View Detailed Analysis
cpe:2.3:a:al-enterprise:omnivista_4760:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://git.lsd.cat/g/omnivista-rce
https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remo…
https://www.al-enterprise.com/en/-/media/assets/internet/documents/sa-c0065-ov8…
https://www.exploit-db.com/exploits/47761
https://git.lsd.cat/g/omnivista-rce
https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remo…
https://www.al-enterprise.com/en/-/media/assets/internet/documents/sa-c0065-ov8…
https://www.exploit-db.com/exploits/47761