{"vuid":"VU#169249","idnumber":"169249","name":"PrinterLogic Print Management Software fails to validate SSL certificates or the integrity of software updates.","keywords":["CWE-295; CWE-494; CWE-159; PrinterLogic; SSL certificate","CVE-2018-5408","CVE-2018-5409","CVE-2019-9505"],"overview":"PrinterLogic Print Management Software fails to validate SSL and software update certificates, which could allow an attacker to reconfigure the software and remotely execute code. In addition, the PrinterLogic agent does not sanitize browser input allowing a remote attacker to modify configuration settings. These vulnerabilities may result in a remote attacker executing code on workstations running the PrinterLogic agent.","clean_desc":"PrinterLogic versions up to and including 18.3.1.96 are vulnerable to multiple attacks. The PrinterLogic agent,running as SYSTEM,does not validate the PrinterLogic Management Portal's SSL certificate,validate PrinterLogic update packages,or sanitize web browser input. CVE-2018-5408:The PrinterLogic Print Management software does not validate,or incorrectly validates,the PrinterLogic management portal's SSL certificate. When a certificate is invalid or malicious,it might allow an attacker to spoof a trusted entity by using a man-in-the-middle(MITM)attack. The software might connect to a malicious host while believing it is a trusted host,or the software might be deceived into accepting spoofed data that appears to originate from a trusted host. (C WE-295) CVE-2018-5409:PrinterLogic Print Management software updates and executes the code without sufficiently verifying the origin and integrity of the code. An attacker can execute malicious code by compromising the host server,performing DNS spoofing,or modifying the code in transit. (CWE-494) CVE-2019-9505:PrinterLogic Print Management software does not sanitize special characters allowing for remote unauthorized changes to configuration files. (CWE-159)","impact":"An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges.","resolution":"Update PrinterLogic Print Management Software  https://www.printerlogic.com/security-bulletin/.","workarounds":"","sysaffected":"","thanks":"Thanks to the Adversarial Simulation Team at Sygnia(Sygnia Consulting),led by David Warshavski and Doron Vazgiel,for reporting these vulnerabilities and participating in the coordinated vulnerability disclosure process.","author":"This document was written by Laurie Tyzenhaus.","public":["https://www.printerlogic.com/security-bulletin/","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5408","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5409","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9505","https://cwe.mitre.org/data/definitions/295.html","https://cwe.mitre.org/data/definitions/494.html","https://cwe.mitre.org/data/definitions/159.html"],"cveids":["CVE-2018-5408","CVE-2018-5409","CVE-2019-9505"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2018-06-14T18:09:17Z","publicdate":"2019-05-03T00:00:00Z","datefirstpublished":"2019-05-03T16:15:21Z","dateupdated":"2019-05-22T14:19:27Z","revision":59,"vrda_d1_directreport":"1","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"C","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.8","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:C/A:N","cvss_temporalscore":"7.8","cvss_environmentalscore":"7.810852056","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}