Multiple Dräger Products Multiple Security Vulnerabilities
BID:106683
CVE-2018-19010 | CVE-2018-19012 | CVE-2018-19014 |Info
Multiple Dräger Products Multiple Security Vulnerabilities
| Bugtraq ID: | 106683 |
| Class: | Unknown |
| CVE: |
CVE-2018-19010 CVE-2018-19014 CVE-2018-19012 |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 22 2019 12:00AM |
| Updated: | Jan 22 2019 12:00AM |
| Credit: | Marc Ruef and Rocco Gagliardi from scip AG. |
| Vulnerable: |
Dräger Infinity Kappa 0 Dräger Infinity Explorer C700 0 Dräger Infinity Delta XL 0 Dräger Infinity Delta 0 |
| Not Vulnerable: |
Dräger Infinity Explorer C700 VF10.1 |
Discussion
Multiple Dräger Products Multiple Security Vulnerabilities
Dräger Infinity is prone to multiple security vulnerabilities:
1. A denial-of-service vulnerability.
2. An information disclosure vulnerability.
3. A privilege-escalation vulnerability.
An attacker can leverage these issues to cause an affected device to reboot; resulting in a denial-of-service condition, gain access to sensitive information or gain elevated privileges to perform unauthorized actions.
All versions of following Dräger Infinity products are vulnerable:
Dräger Infinity Delta
Dräger Infinity Delta XL
Dräger Infinity Kappa
Dräger Infinity Explorer C700
Dräger Infinity is prone to multiple security vulnerabilities:
1. A denial-of-service vulnerability.
2. An information disclosure vulnerability.
3. A privilege-escalation vulnerability.
An attacker can leverage these issues to cause an affected device to reboot; resulting in a denial-of-service condition, gain access to sensitive information or gain elevated privileges to perform unauthorized actions.
All versions of following Dräger Infinity products are vulnerable:
Dräger Infinity Delta
Dräger Infinity Delta XL
Dräger Infinity Kappa
Dräger Infinity Explorer C700
Exploit / POC
Multiple Dräger Products Multiple Security Vulnerabilities
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].