Exploit Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 23rd, 2019 📆 | 3253 Views ⚑


Zenoss 2.5.3 XML-RPC Subsystem XXE information disclosure

CVSS Meta Temp Score Current Exploit Price (≈)
4.2 $0-$5k

A vulnerability was found in Zenoss 2.5.3. It has been rated as problematic. This issue affects an unknown code of the component XML-RPC Subsystem. The manipulation with an unknown input leads to a information disclosure vulnerability (XXE). Using CWE to declare the problem leads to CWE-611. Impacted is confidentiality.

The weakness was presented 08/21/2019. It is possible to read the advisory at coalfire.com. The identification of this vulnerability is CVE-2019-14258 since 07/24/2019. No form of authentication is needed for a successful exploitation. The technical details are unknown and an exploit is not publicly available.

Addressing this vulnerability is possible by firewalling 9988.

See 140542 for similar entry.


VulDB Meta Base Score: 4.3
VulDB Meta Temp Score: 4.2

VulDB Base Score: ≈4.3
VulDB Temp Score: ≈4.2
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Information disclosure / XXE (CWE-611)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Firewall
Status: 🔍

0-Day Time: 🔒

Firewalling: 🔒

07/24/2019 CVE assigned
08/21/2019 +28 days Advisory disclosed
08/22/2019 +1 days VulDB entry created
08/22/2019 +0 days VulDB last updateAdvisory: coalfire.com

CVE: CVE-2019-14258 (🔒)
See also: 🔒

Created: 08/22/2019 09:27 AM
Complete: 🔍

See the underground prices here!


Download WordPress Themes Free
Premium WordPress Themes Download
Premium WordPress Themes Download
Download Best WordPress Themes Free Download
udemy course download free

Tagged with:

Leave a Reply ✍