VAR-201906-0328
Vulnerability from variot - Updated: 2023-12-18 13:02Fuji Electric V-Server before 6.0.33.0 stores database credentials in project files as plaintext. An attacker that can gain access to the project file can recover the database credentials and gain access to the database server. Fuji Electric V-Server Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Fuji Electric V-Server is prone to multiple security vulnerabilities: 1. A remote denial-of-service vulnerability 2. An information disclosure vulnerability An attacker can exploit these issues to cause a denial-of-service condition or obtain sensitive information that may lead to further attacks . Versions prior to V-SFT 6.0.33.0 are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201906-0328",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "v-server",
"scope": "lt",
"trust": 1.0,
"vendor": "fujielectric",
"version": "6.0.33.0"
},
{
"model": "v-server",
"scope": "lt",
"trust": 0.8,
"vendor": "fuji electric",
"version": "6.0.33.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.9.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.8.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.7.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.6.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.5.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.4.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.32.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.31.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.30.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.3.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.29.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.28.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.27.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.26.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.25.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.24.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.23.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.22.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.21.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.20.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.2.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.19.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.18.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.17.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.16.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.15.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.14.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.13.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.12.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.11.0"
},
{
"model": "electric monitouch v-sft",
"scope": "eq",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.10.0"
},
{
"model": "electric monitouch v-sft",
"scope": "ne",
"trust": 0.3,
"vendor": "fuji",
"version": "6.0.33.0"
}
],
"sources": [
{
"db": "BID",
"id": "108740"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005462"
},
{
"db": "NVD",
"id": "CVE-2019-3947"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:fujielectric:v-server:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.0.33.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3947"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Tenable",
"sources": [
{
"db": "BID",
"id": "108740"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-558"
}
],
"trust": 0.9
},
"cve": "CVE-2019-3947",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2019-3947",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-3947",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-3947",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNNVD",
"id": "CNNVD-201906-558",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULMON",
"id": "CVE-2019-3947",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2019-3947"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005462"
},
{
"db": "NVD",
"id": "CVE-2019-3947"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-558"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Fuji Electric V-Server before 6.0.33.0 stores database credentials in project files as plaintext. An attacker that can gain access to the project file can recover the database credentials and gain access to the database server. Fuji Electric V-Server Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Fuji Electric V-Server is prone to multiple security vulnerabilities:\n1. A remote denial-of-service vulnerability\n2. An information disclosure vulnerability\nAn attacker can exploit these issues to cause a denial-of-service condition or obtain sensitive information that may lead to further attacks . \nVersions prior to V-SFT 6.0.33.0 are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3947"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005462"
},
{
"db": "BID",
"id": "108740"
},
{
"db": "VULMON",
"id": "CVE-2019-3947"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "TENABLE",
"id": "TRA-2019-27",
"trust": 2.8
},
{
"db": "NVD",
"id": "CVE-2019-3947",
"trust": 2.8
},
{
"db": "BID",
"id": "108740",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005462",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201906-558",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2019-3947",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2019-3947"
},
{
"db": "BID",
"id": "108740"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005462"
},
{
"db": "NVD",
"id": "CVE-2019-3947"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-558"
}
]
},
"id": "VAR-201906-0328",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.65
},
"last_update_date": "2023-12-18T13:02:12.390000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "V-Server",
"trust": 0.8,
"url": "https://monitouch.fujielectric.com/site/tellus-e/tellus03-01.html"
},
{
"title": "Fuji Electric V-Server Repair measures for trust management problem vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93790"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005462"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-558"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-522",
"trust": 1.0
},
{
"problemtype": "CWE-255",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005462"
},
{
"db": "NVD",
"id": "CVE-2019-3947"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://www.tenable.com/security/research/tra-2019-27"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/bid/108740"
},
{
"trust": 0.9,
"url": "http://www.fujielectric.com/"
},
{
"trust": 0.9,
"url": "https://monitouch.fujielectric.com/site/support-e/more-index-t.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3947"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-3947"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/522.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2019-3947"
},
{
"db": "BID",
"id": "108740"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005462"
},
{
"db": "NVD",
"id": "CVE-2019-3947"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-558"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2019-3947"
},
{
"db": "BID",
"id": "108740"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005462"
},
{
"db": "NVD",
"id": "CVE-2019-3947"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-558"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-06-12T00:00:00",
"db": "VULMON",
"id": "CVE-2019-3947"
},
{
"date": "2019-06-11T00:00:00",
"db": "BID",
"id": "108740"
},
{
"date": "2019-06-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005462"
},
{
"date": "2019-06-12T15:29:00.910000",
"db": "NVD",
"id": "CVE-2019-3947"
},
{
"date": "2019-06-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-558"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-08-24T00:00:00",
"db": "VULMON",
"id": "CVE-2019-3947"
},
{
"date": "2019-06-11T00:00:00",
"db": "BID",
"id": "108740"
},
{
"date": "2019-06-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005462"
},
{
"date": "2020-08-24T17:37:01.140000",
"db": "NVD",
"id": "CVE-2019-3947"
},
{
"date": "2020-08-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-558"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-558"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Fuji Electric V-Server Vulnerabilities related to certificate and password management",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005462"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-558"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.