Password disclosure in the web interface on socomec DIRIS A-40 devices before 48250501 allows a remote attacker to get full access to a device via the /password.jsn URI.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/154764/Socomec-DIRIS-A-40-Password-Disclosure.html | Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2019/Oct/10 | Mailing List Third Party Advisory | 
| https://www.socomec.com/single-circuit-multifunction-meters_en.html | Product | 
| http://packetstormsecurity.com/files/154764/Socomec-DIRIS-A-40-Password-Disclosure.html | Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2019/Oct/10 | Mailing List Third Party Advisory | 
| https://www.socomec.com/single-circuit-multifunction-meters_en.html | Product | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2019-10-09 16:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15859
Mitre link : CVE-2019-15859
CVE.ORG link : CVE-2019-15859
JSON object : View
Products Affected
                socomec
- diris_a-40
 - diris_a-40_firmware
 
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
