Vulnerability Description
Kalki Kalkitech SYNC3000 Substation DCU GPC v2.22.6, 2.23.0, 2.24.0, 3.0.0, 3.1.0, 3.1.16, 3.2.3, 3.2.6, 3.5.0, 3.6.0, and 3.6.1, when WebHMI is not installed, allows an attacker to inject client-side commands or scripts to be executed on the device with privileged access, aka CYB/2019/19561. The attack requires network connectivity to the device and exploits the webserver interface, typically through a browser.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kalkitech | Sync3000 Firmware | 2.22.6 |
| Kalkitech | Sync3000 | - |
References
- https://www.kalkitech.com/cybersecurity/Vendor Advisory
- https://www.kalkitech.com/wp-content/uploads/CYB_19561_Advisory.pdfVendor Advisory
- https://www.kalkitech.com/cybersecurity/Vendor Advisory
- https://www.kalkitech.com/wp-content/uploads/CYB_19561_Advisory.pdfVendor Advisory
FAQ
What is CVE-2019-11536?
CVE-2019-11536 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Kalki Kalkitech SYNC3000 Substation DCU GPC v2.22.6, 2.23.0, 2.24.0, 3.0.0, 3.1.0, 3.1.16, 3.2.3, 3.2.6, 3.5.0, 3.6.0, and 3.6.1, when WebHMI is not installed, allows an attacker to inject client-side...
How severe is CVE-2019-11536?
CVE-2019-11536 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-11536?
Check the references section above for vendor advisories and patch information. Affected products include: Kalkitech Sync3000 Firmware, Kalkitech Sync3000.