This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the DeviceMgmt class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of the Postgres database.
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech WISE-PaaS/RMM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-9191 is considered a medium severity vulnerability due to the potential for sensitive information disclosure.
To fix ZDI-CAN-9191, ensure that you are using the latest version of Advantech WISE-PaaS/RMM, which addresses this vulnerability.
ZDI-CAN-9191 affects installations of Advantech WISE-PaaS/RMM that utilize the vulnerable authentication mechanism.
ZDI-CAN-9191 enables remote attackers to potentially disclose sensitive information on affected systems.
Yes, authentication is required to exploit ZDI-CAN-9191, but it can be bypassed due to the specific flaw in the authentication mechanism.