Description
The Fujitsu TLS library allows a man-in-the-middle attack. This affects Interstage Application Development Cycle Manager V10 and other versions, Interstage Application Server V12 and other versions, Interstage Business Application Manager V2 and other versions, Interstage Information Integrator V11 and other versions, Interstage Job Workload Server V8, Interstage List Works V10 and other versions, Interstage Studio V12 and other versions, Interstage Web Server Express V11, Linkexpress V5, Safeauthor V3, ServerView Resource Orchestrator V3, Systemwalker Cloud Business Service Management V1, Systemwalker Desktop Keeper V15, Systemwalker Desktop Patrol V15, Systemwalker IT Change Manager V14, Systemwalker Operation Manager V16 and other versions, Systemwalker Runbook Automation V15 and other versions, Systemwalker Security Control V1, and Systemwalker Software Configuration Manager V15.
Published: 2020-02-07
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-4690 The Fujitsu TLS library allows a man-in-the-middle attack. This affects Interstage Application Development Cycle Manager V10 and other versions, Interstage Application Server V12 and other versions, Interstage Business Application Manager V2 and other versions, Interstage Information Integrator V11 and other versions, Interstage Job Workload Server V8, Interstage List Works V10 and other versions, Interstage Studio V12 and other versions, Interstage Web Server Express V11, Linkexpress V5, Safeauthor V3, ServerView Resource Orchestrator V3, Systemwalker Cloud Business Service Management V1, Systemwalker Desktop Keeper V15, Systemwalker Desktop Patrol V15, Systemwalker IT Change Manager V14, Systemwalker Operation Manager V16 and other versions, Systemwalker Runbook Automation V15 and other versions, Systemwalker Security Control V1, and Systemwalker Software Configuration Manager V15.
History

No history.

Subscriptions

Fujitsu Celsius Celsius Firmware Gp7000f Gp7000f Firmware Gps Gps Firmware Granpower 5000 Granpower 5000 Firmware Interstage Application Development Cycle Manager Interstage Application Server Interstage Business Application Manager Interstage Information Integrator Interstage Information Integrator Agent Interstage Job Workload Server Interstage List Works Interstage Studio Interstage Web Server Express Linkexpress Primepower Primepower Firmware Primequest Primequest Firmware Primergy Rx2530 M5 Primergy Rx2530 M5 Firmware Primergy Rx2540 M5 Primergy Rx2540 M5 Firmware Primergy Rx4770 M5 Primergy Rx4770 M5 Firmware Primergy Tx2550 M5 Primergy Tx2550 M5 Firmware Safeauthor Serverview Resource Orchestrator Sparc Enterprise M3000 Sparc Enterprise M3000 Firmware Sparc Enterprise M4000 Sparc Enterprise M4000 Firmware Sparc Enterprise M5000 Sparc Enterprise M5000 Firmware Sparc Enterprise M8000 Sparc Enterprise M8000 Firmware Sparc Enterprise M9000 Sparc Enterprise M9000 Firmware Sparc M12-1 Sparc M12-1 Firmware Sparc M12-2 Sparc M12-2 Firmware Sparc M12-2s Sparc M12-2s Firmware Systemwalker Desktop Keeper Systemwalker Desktop Patrol Systemwalker It Change Manager V14g Systemwalker Operation Manager Systemwalker Runbook Automation Systemwalker Runbook Automation V14g Systemwalker Security Control Systemwalker Software Configuration Manager Systemwalker Software Configuration Manager Express Triole Cloud Middle Set B Set
Microsoft Windows Server 2008 Windows Server 2012 Windows Server 2016 Windows Server 2019 Windows Small Business Server 2011
Oracle Solaris
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:41:10.575Z

Reserved: 2019-07-02T00:00:00.000Z

Link: CVE-2019-13163

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-07T23:15:09.933

Modified: 2024-11-21T04:24:19.820

Link: CVE-2019-13163

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses