9.8
CRITICAL
CVE-2019-18226
Honeywell equIP series and Performance series IP Cameras Authentication Replay Attack Vulnerability
Description

Honeywell equIP series and Performance series IP cameras and recorders, A vulnerability exists in the affected products where IP cameras and recorders have a potential replay attack vulnerability as a weak authentication method is retained for compatibility with legacy products.

INFO

Published Date :

Oct. 31, 2019, 10:15 p.m.

Last Modified :

Nov. 21, 2024, 4:32 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2019-18226 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Honeywell h2w2pc1m_firmware
2 Honeywell h2w2per3_firmware
3 Honeywell h2w4per3_firmware
4 Honeywell h4w2per2_firmware
5 Honeywell h4w2per3_firmware
6 Honeywell h4w4per2_firmware
7 Honeywell h4w4per3_firmware
8 Honeywell h4w8pr2_firmware
9 Honeywell hbd2per1_firmware
10 Honeywell hbw2per1_firmware
11 Honeywell hbw2per2_firmware
12 Honeywell hbw4per1_firmware
13 Honeywell hbw4per2_firmware
14 Honeywell hbw4pgr1_firmware
15 Honeywell hbw8pr2_firmware
16 Honeywell hed2per3_firmware
17 Honeywell hew2per2_firmware
18 Honeywell hew2per3_firmware
19 Honeywell hew4per2b_firmware
20 Honeywell hew4per3_firmware
21 Honeywell hew4per3b_firmware
22 Honeywell hdzp252di_firmware
23 Honeywell hdzp304di_firmware
24 Honeywell hpw2p1_firmware
25 Honeywell h2w2gr1_firmware
26 Honeywell h3w2gr1v_firmware
27 Honeywell h3w4gr1v_firmware
28 Honeywell h3w2gr1_firmware
29 Honeywell h3w2gr2_firmware
30 Honeywell h3w4gr1_firmware
31 Honeywell h4l2gr1v_firmware
32 Honeywell h4w2gr1_firmware
33 Honeywell h4w2gr1v_firmware
34 Honeywell h4w4gr1v_firmware
35 Honeywell h4l2gr1_firmware
36 Honeywell h4w2gr2_firmware
37 Honeywell h4w4gr1_firmware
38 Honeywell h4l6gr2_firmware
39 Honeywell hm4l8gr1_firmware
40 Honeywell h4d8gr1_firmware
41 Honeywell hbl2gr1v_firmware
42 Honeywell hbw2gr1v_firmware
43 Honeywell hbw2gr3v_firmware
44 Honeywell hbw4gr1v_firmware
45 Honeywell hbl6gr2_firmware
46 Honeywell hmbl8gr1_firmware
47 Honeywell hbd8gr1_firmware
48 Honeywell hfd6gr1_firmware
49 Honeywell hfd8gr1_firmware
50 Honeywell hdz302liw_firmware
51 Honeywell hdz302lik_firmware
52 Honeywell hdz302de_firmware
53 Honeywell hdz302d_firmware
54 Honeywell hdz302din-c1_firmware
55 Honeywell hdz302din-s1_firmware
56 Honeywell hepz302w0_firmware
57 Honeywell hcl2gv_firmware
58 Honeywell hcl2g_firmware
59 Honeywell hcw2g_firmware
60 Honeywell hcw4g_firmware
61 Honeywell hcd8g_firmware
62 Honeywell hsw2g1_firmware
63 Honeywell hswb2g1_firmware
64 Honeywell hcw2gv_firmware
65 Honeywell h4d8pr1_firmware
66 Honeywell hfd5pr1_firmware
67 Honeywell hbl2gr1_firmware
68 Honeywell hbw2gr1_firmware
69 Honeywell hbw2gr3_firmware
70 Honeywell hbw4gr1_firmware
71 Honeywell hdz302din_firmware
72 Honeywell h4w8pr2
73 Honeywell hbw8pr2
74 Honeywell h2w2pc1m
75 Honeywell h2w4per3
76 Honeywell h2w2per3
77 Honeywell hew2per3
78 Honeywell hew4per3b
79 Honeywell hbw2per1
80 Honeywell hew4per2b
81 Honeywell hew2per2
82 Honeywell h4w2per2
83 Honeywell hbw2per2
84 Honeywell h4w2per3
85 Honeywell hpw2p1
86 Honeywell h4w4per2
87 Honeywell h4w4per3
88 Honeywell hbd2per1
89 Honeywell hbw4per1
90 Honeywell hbw4per2
91 Honeywell hbw4pgr1
92 Honeywell hed2per3
93 Honeywell hew4per3
94 Honeywell hdzp252di
95 Honeywell hdzp304di
96 Honeywell h2w2gr1
97 Honeywell h3w2gr1v
98 Honeywell h3w4gr1v
99 Honeywell h3w2gr1
100 Honeywell h3w2gr2
101 Honeywell h3w4gr1
102 Honeywell h4l2gr1v
103 Honeywell h4w2gr1
104 Honeywell h4w2gr1v
105 Honeywell h4w4gr1v
106 Honeywell h4l2gr1
107 Honeywell h4w2gr2
108 Honeywell h4w4gr1
109 Honeywell h4l6gr2
110 Honeywell hm4l8gr1
111 Honeywell h4d8gr1
112 Honeywell hbl2gr1v
113 Honeywell hbw2gr1v
114 Honeywell hbw2gr3v
115 Honeywell hbw4gr1v
116 Honeywell hbl6gr2
117 Honeywell hmbl8gr1
118 Honeywell hbd8gr1
119 Honeywell hfd6gr1
120 Honeywell hfd8gr1
121 Honeywell hdz302liw
122 Honeywell hdz302lik
123 Honeywell hdz302de
124 Honeywell hdz302d
125 Honeywell hdz302din-c1
126 Honeywell hdz302din-s1
127 Honeywell hepz302w0
128 Honeywell hcl2gv
129 Honeywell hcl2g
130 Honeywell hcw2g
131 Honeywell hcw4g
132 Honeywell hcd8g
133 Honeywell hsw2g1
134 Honeywell hswb2g1
135 Honeywell hcw2gv
136 Honeywell h2w2gr1
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2019-18226.

URL Resource
https://www.us-cert.gov/ics/advisories/icsa-19-304-04 Third Party Advisory US Government Resource
https://www.us-cert.gov/ics/advisories/icsa-19-304-04 Third Party Advisory US Government Resource

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2019-18226 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2019-18226 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.us-cert.gov/ics/advisories/icsa-19-304-04
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Reanalysis by [email protected]

    Sep. 29, 2020

    Action Type Old Value New Value
    Removed CPE Configuration AND OR *cpe:2.3:o:honeywell:hcw2gv_firmware:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:honeweyll:h4w2per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeweyll:h4w2per2:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:honeywell:h4w2per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w2per2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcw2gv_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcw2gv:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 27, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:honeywell:hcw2gv:_:*:*:*:*:*:*:* OR *cpe:2.3:h:honeywell:hcw2gv:-:*:*:*:*:*:*:*
  • Initial Analysis by [email protected]

    Nov. 05, 2019

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.us-cert.gov/ics/advisories/icsa-19-304-04 No Types Assigned https://www.us-cert.gov/ics/advisories/icsa-19-304-04 Third Party Advisory, US Government Resource
    Added CWE NIST CWE-294
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h2w2pc1m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h2w2pc1m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h2w2per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h2w2per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h2w4per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h2w4per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeweyll:h4w2per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeweyll:h4w2per2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w2per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w2per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w4per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w4per2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w4per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w4per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w8pr2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w8pr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbd2per1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbd2per1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw2per1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw2per1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw2per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw2per2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw4per1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw4per1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw4per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw4per2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw4pgr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw4pgr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw8pr2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw8pr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hed2per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hed2per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hew2per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hew2per2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hew2per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hew2per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hew4per2b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hew4per2b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hew4per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hew4per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hew4per3b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hew4per3b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hew4per2b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hew4per2b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdzp252di_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdzp252di:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdzp304di_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdzp304di:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hpw2p1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hpw2p1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h2w2gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h2w2gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h3w2gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h3w2gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h3w4gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h3w4gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h3w2gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h3w2gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h3w2gr2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h3w2gr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h3w4gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h3w4gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4l2gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4l2gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w2gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w2gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w2gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w2gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w4gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w4gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4l2gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4l2gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w2gr2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w2gr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w4gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w4gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4l6gr2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4l6gr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hm4l8gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hm4l8gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4d8gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4d8gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbl2gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbl2gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw2gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw2gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw2gr3v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw2gr3v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw4gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw4gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbl6gr2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbl6gr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hmbl8gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hmbl8gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbd8gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbd8gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hfd6gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hfd6gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hfd8gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hfd8gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdz302liw_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdz302liw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdz302lik_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdz302lik:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdz302de_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdz302de:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdz302d_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdz302d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdz302din-c1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdz302din-c1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdz302din-s1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdz302din-s1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hepz302w0_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hepz302w0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcl2gv_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcl2gv:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcw2gv_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcw2gv:_:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcl2g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcl2g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcw2g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcw2g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcw4g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcw4g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcd8g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcd8g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hsw2g1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hsw2g1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hswb2g1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hswb2g1:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.18 }} -0.31%

score

0.36167

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: Apr. 27, 2025 12:21