First published: Thu Oct 10 2019(Updated: )
An issue was discovered in Softing uaGate SI 1.60.01. A maintenance script, that is executable via sudo, is vulnerable to file path injection. This enables the Attacker to write files with superuser privileges in specific locations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Softing Uagate Si Firmware | =1.60.01 | |
Softing uaGate SI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-11526.
The severity of CVE-2019-11526 is critical with a score of 9.8.
The vulnerability in Softing uaGate SI 1.60.01 occurs due to a file path injection in a maintenance script that can be executed via sudo.
If an attacker exploits CVE-2019-11526, they can write files with superuser privileges in specific locations.
Yes, Softing uaGate SI 1.60.01 is vulnerable to this issue.
To fix the vulnerability in Softing uaGate SI 1.60.01, it is recommended to apply the latest security patch or update provided by the vendor.