CVE-2019-15687 (GCVE-0-2019-15687)

Vulnerability from cvelistv5 – Published: 2019-11-26 15:45 – Updated: 2024-08-05 00:56
VLAI?
Summary
Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component was vulnerable to remote disclosure of various information about the user's system (like Windows version and version of the product, host unique ID). Information Disclosure.
Severity ?
No CVSS data available.
CWE
  • Information Disclosure.
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:56:22.458Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud",
          "vendor": "Kaspersky",
          "versions": [
            {
              "status": "affected",
              "version": "up to 2020"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component was vulnerable to remote disclosure of various information about the user\u0027s system (like Windows version and version of the product, host unique ID). Information Disclosure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-26T15:45:17",
        "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988",
        "shortName": "Kaspersky"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vulnerability@kaspersky.com",
          "ID": "CVE-2019-15687",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "up to 2020"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Kaspersky"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component was vulnerable to remote disclosure of various information about the user\u0027s system (like Windows version and version of the product, host unique ID). Information Disclosure."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1",
              "refsource": "CONFIRM",
              "url": "https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988",
    "assignerShortName": "Kaspersky",
    "cveId": "CVE-2019-15687",
    "datePublished": "2019-11-26T15:45:17",
    "dateReserved": "2019-08-27T00:00:00",
    "dateUpdated": "2024-08-05T00:56:22.458Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:kaspersky:anti-virus:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2020\", \"matchCriteriaId\": \"8765E8CA-25D7-45C4-A2B6-3E1CAB48D4BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:kaspersky:anti-virus:*:*:*:*:free:*:*:*\", \"versionEndIncluding\": \"2020\", \"matchCriteriaId\": \"EE131770-352E-4D9A-BE68-AA02736FBC8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:kaspersky:internet_security:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2020\", \"matchCriteriaId\": \"09282512-31CB-4248-B57A-9CC77ED62642\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:kaspersky:security_cloud:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2020\", \"matchCriteriaId\": \"03CD0D9A-0787-4123-821D-89FB247FE002\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:kaspersky:small_office_security:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7\", \"matchCriteriaId\": \"5B11ACD5-3CFA-45EB-8505-D686EBB1E5FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:kaspersky:total_security:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2020\", \"matchCriteriaId\": \"CF1EF32C-3E9E-4CC6-90E0-D992FDEE984A\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component was vulnerable to remote disclosure of various information about the user\u0027s system (like Windows version and version of the product, host unique ID). Information Disclosure.\"}, {\"lang\": \"es\", \"value\": \"Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud hasta el 2020, el componente web protection era vulnerable a una divulgaci\\u00f3n remota de diversa informaci\\u00f3n sobre el sistema del usuario (como  versi\\u00f3n de Window y versi\\u00f3n del producto, ID \\u00fanico del host). Divulgaci\\u00f3n de Informaci\\u00f3n.\"}]",
      "id": "CVE-2019-15687",
      "lastModified": "2024-11-21T04:29:15.727",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2019-11-26T16:15:12.180",
      "references": "[{\"url\": \"https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1\", \"source\": \"vulnerability@kaspersky.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "vulnerability@kaspersky.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-15687\",\"sourceIdentifier\":\"vulnerability@kaspersky.com\",\"published\":\"2019-11-26T16:15:12.180\",\"lastModified\":\"2024-11-21T04:29:15.727\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component was vulnerable to remote disclosure of various information about the user\u0027s system (like Windows version and version of the product, host unique ID). Information Disclosure.\"},{\"lang\":\"es\",\"value\":\"Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud hasta el 2020, el componente web protection era vulnerable a una divulgaci\u00f3n remota de diversa informaci\u00f3n sobre el sistema del usuario (como  versi\u00f3n de Window y versi\u00f3n del producto, ID \u00fanico del host). Divulgaci\u00f3n de Informaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kaspersky:anti-virus:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2020\",\"matchCriteriaId\":\"8765E8CA-25D7-45C4-A2B6-3E1CAB48D4BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kaspersky:anti-virus:*:*:*:*:free:*:*:*\",\"versionEndIncluding\":\"2020\",\"matchCriteriaId\":\"EE131770-352E-4D9A-BE68-AA02736FBC8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kaspersky:internet_security:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2020\",\"matchCriteriaId\":\"09282512-31CB-4248-B57A-9CC77ED62642\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kaspersky:security_cloud:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2020\",\"matchCriteriaId\":\"03CD0D9A-0787-4123-821D-89FB247FE002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kaspersky:small_office_security:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7\",\"matchCriteriaId\":\"5B11ACD5-3CFA-45EB-8505-D686EBB1E5FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kaspersky:total_security:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2020\",\"matchCriteriaId\":\"CF1EF32C-3E9E-4CC6-90E0-D992FDEE984A\"}]}]}],\"references\":[{\"url\":\"https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1\",\"source\":\"vulnerability@kaspersky.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…