Prima Systems FlexAir, Versions 2.3.38 and prior. The application generates database backup files with a predictable name, and an attacker can use brute force to identify the database backup file name. A malicious actor can exploit this issue to download the database file and disclose login information, which can allow the attacker to bypass authentication and have full access to the system.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Link | Tags |
---|---|
https://applied-risk.com/labs/advisories | third party advisory |
https://www.applied-risk.com/resources/ar-2019-007 | third party advisory |
https://www.us-cert.gov/ics/advisories/icsa-19-211-02 | third party advisory us government resource |
http://packetstormsecurity.com/files/155262/Prima-FlexAir-Access-Control-2.3.35-Database-Backup-Predictable-Name.html | exploit vdb entry third party advisory |