CVE-2017-14728
moderate-risk
Published 2019-06-03
An authentication bypass was found in an unknown area of the SiteOmat source code. All SiteOmat BOS versions are affected, prior to the submission of this exploit. Also, the SiteOmat does not force administrators to switch passwords, leaving SSH and HTTP remote authentication open to public.
Do I need to act?
!
10.6% chance of exploitation in next 30 days
EPSS score — higher than 89% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/108167
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-19-122-01
Third Party Advisory
http://www.securityfocus.com/bid/108167
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-19-122-01
48
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
11/34 · Low
Exposure
5/34 · Minimal