Vulnerability Description
AdRem NetCrunch 10.6.0.4587 allows Remote Code Execution. In the NetCrunch web client, a read-only administrator can execute arbitrary code on the server running the NetCrunch server software.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Adremsoft | Netcrunch | 10.6.0.4587 |
Related Weaknesses (CWE)
References
- https://compass-security.com/fileadmin/Research/Advisories/2020-13_CSNC-2019-014ExploitThird Party Advisory
- https://www.adremsoft.com/support/Vendor Advisory
- https://compass-security.com/fileadmin/Research/Advisories/2020-13_CSNC-2019-014ExploitThird Party Advisory
- https://www.adremsoft.com/support/Vendor Advisory
FAQ
What is CVE-2019-14479?
CVE-2019-14479 is a vulnerability with a CVSS score of 8.8 (HIGH). AdRem NetCrunch 10.6.0.4587 allows Remote Code Execution. In the NetCrunch web client, a read-only administrator can execute arbitrary code on the server running the NetCrunch server software.
How severe is CVE-2019-14479?
CVE-2019-14479 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-14479?
Check the references section above for vendor advisories and patch information. Affected products include: Adremsoft Netcrunch.