Learn about CVE-2019-19967 affecting Connect Box EuroDOCSIS 3.0 Voice Gateway CH7465LG-NCIP-6.12.18.25-2p6-NOSH devices. Understand the impact, technical details, and mitigation steps.
The Connect Box EuroDOCSIS 3.0 Voice Gateway CH7465LG-NCIP-6.12.18.25-2p6-NOSH devices have a vulnerability that allows users to enter passwords in plain text format, which can be intercepted.
Understanding CVE-2019-19967
This CVE identifies a security issue in the Connect Box EuroDOCSIS 3.0 Voice Gateway CH7465LG-NCIP-6.12.18.25-2p6-NOSH devices.
What is CVE-2019-19967?
The vulnerability in these devices enables users to input passwords in plain text on the Administration page, which are then transmitted via a POST request on port 80 and can be viewed in the Password field of the xml/setter.xml URI.
The Impact of CVE-2019-19967
This vulnerability poses a significant security risk as it exposes user passwords in plain text, making them susceptible to interception by malicious actors.
Technical Details of CVE-2019-19967
The following technical details outline the specifics of this CVE.
Vulnerability Description
The Administration page of the affected devices accepts passwords in cleartext format, which are sent over port 80, allowing for potential interception.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability occurs when users input passwords in plain text on the Administration page, which are then transmitted via a POST request on port 80, exposing them to interception.
Mitigation and Prevention
Protecting against CVE-2019-19967 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that the devices are updated with the latest firmware and security patches to mitigate the vulnerability.