Vulnerability Description
Gemalto Admin Control Center, all versions prior to 7.92, uses cleartext HTTP to communicate with www3.safenet-inc.com to obtain language packs. This allows attacker to do man-in-the-middle (MITM) attack and replace original language pack by malicious one.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gemalto | Sentinel Ldk | < 7.92 |
Related Weaknesses (CWE)
References
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/06/05/klcert-19Third Party Advisory
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/06/05/klcert-19Third Party Advisory
FAQ
What is CVE-2019-8282?
CVE-2019-8282 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Gemalto Admin Control Center, all versions prior to 7.92, uses cleartext HTTP to communicate with www3.safenet-inc.com to obtain language packs. This allows attacker to do man-in-the-middle (MITM) att...
How severe is CVE-2019-8282?
CVE-2019-8282 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-8282?
Check the references section above for vendor advisories and patch information. Affected products include: Gemalto Sentinel Ldk.