This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the PowerMgmt class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of the Postgres database.
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech WISE-PaaS/RMM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-19-949 is considered to be high due to the potential for remote attackers to disclose sensitive information.
To fix ZDI-19-949, apply the latest security updates released by Advantech for the WISE-PaaS/RMM software.
Attackers can exploit ZDI-19-949 to bypass authentication and access sensitive information on affected installations.
Yes, authentication is required to exploit ZDI-19-949, but the existing mechanism can be bypassed.
The affected software for ZDI-19-949 is Advantech WISE-PaaS/RMM.