AdRem NetCrunch 10.6.0.4587 has a hardcoded SSL private key vulnerability in the NetCrunch web client. The same hardcoded SSL private key is used across different customers' installations when no other SSL certificate is installed, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.
                
            References
                    | Link | Resource | 
|---|---|
| https://compass-security.com/fileadmin/Research/Advisories/2020-16_CSNC-2019-017_AdRem_NetCrunch_Hardcoded_SSL_Private_Key.txt | Exploit Technical Description Third Party Advisory | 
| https://www.adremsoft.com/support/ | Product | 
| https://compass-security.com/fileadmin/Research/Advisories/2020-16_CSNC-2019-017_AdRem_NetCrunch_Hardcoded_SSL_Private_Key.txt | Exploit Technical Description Third Party Advisory | 
| https://www.adremsoft.com/support/ | Product | 
Configurations
                    History
                    21 Nov 2024, 04:26
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://compass-security.com/fileadmin/Research/Advisories/2020-16_CSNC-2019-017_AdRem_NetCrunch_Hardcoded_SSL_Private_Key.txt - Exploit, Technical Description, Third Party Advisory | |
| References | () https://www.adremsoft.com/support/ - Product | 
Information
                Published : 2020-12-16 16:15
Updated : 2024-11-21 04:26
NVD link : CVE-2019-14482
Mitre link : CVE-2019-14482
CVE.ORG link : CVE-2019-14482
JSON object : View
Products Affected
                adremsoft
- netcrunch
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
