Vulnerability Description
EMC Watch4Net before 6.3 stores cleartext polled-device passwords in the installation repository, which allows local users to obtain sensitive information by leveraging repository privileges.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Emc | Watch4Net | <= 6.2 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2013-12/0140.html
- http://packetstormsecurity.com/files/124585/EMC-Watch4net-Information-Disclosure
- http://www.securityfocus.com/bid/64517
- http://www.securitytracker.com/id/1029535
- http://archives.neohapsis.com/archives/bugtraq/2013-12/0140.html
- http://packetstormsecurity.com/files/124585/EMC-Watch4net-Information-Disclosure
- http://www.securityfocus.com/bid/64517
- http://www.securitytracker.com/id/1029535
FAQ
What is CVE-2013-6181?
CVE-2013-6181 is a vulnerability with a CVSS score of 2.1 (LOW). EMC Watch4Net before 6.3 stores cleartext polled-device passwords in the installation repository, which allows local users to obtain sensitive information by leveraging repository privileges.
How severe is CVE-2013-6181?
CVE-2013-6181 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6181?
Check the references section above for vendor advisories and patch information. Affected products include: Emc Watch4Net.