Mobotix Control Center (MxCC) information disclosure | CVE-2022-30018
NAME
Mobotix Control Center (MxCC) information disclosure
- Platforms Affected:
Mobotix Control Center (MxCC) 2.5.4.5 - Risk Level:
8.8 - Exploitability:
Unproven - Consequences:
Obtain Information
DESCRIPTION
Mobotix Control Center (MxCC) could allow a remote authenticated attacker to obtain sensitive information, caused by improper_credential storage. By accessing the MxCC.ini config file, an attacker could exploit this vulnerability to obtain sensitive information and then use this information to launch further attacks against the affected system.
CVSS 3.0 Information
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Access Vector: Network
- Access Complexity: Low
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
- Remediation Level: Unavailable
MITIGATION
No remedy available as of May 19, 2022.
- Reference Link:
https://github.com/PurplePetrus/MxCC_Credential-Storage_issue/blob/main/MxCC_improper_credential_storage - Reference Link:
https://www.mobotix.com/en/products/access-control
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.