Vulnerability Description
Insufficient session validation in the service API for Intel(R) RWC3 version 4.186 and before may allow an unauthenticated user to potentially enable escalation of privilege via network access.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intel | Raid Web Console 3 | <= 4.186 |
References
- http://www.securityfocus.com/bid/108780Broken LinkThird Party AdvisoryVDB Entry
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.PatchVendor Advisory
- http://www.securityfocus.com/bid/108780Broken LinkThird Party AdvisoryVDB Entry
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.PatchVendor Advisory
FAQ
What is CVE-2019-11119?
CVE-2019-11119 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Insufficient session validation in the service API for Intel(R) RWC3 version 4.186 and before may allow an unauthenticated user to potentially enable escalation of privilege via network access.
How severe is CVE-2019-11119?
CVE-2019-11119 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-11119?
Check the references section above for vendor advisories and patch information. Affected products include: Intel Raid Web Console 3.