No analysis available yet.
Vendor Solution
Vertiv Avocent has released patches for these vulnerabilities. Trellis customers of the UMG running firmware v4.2.0.23 that are operating Trellis v5.0.2 through 5.0.6 and all Non-Trellis UMG customers should install the update patch found https://www.vertiv.com/en-us/support/software-download/it-management/avocent-universal-management-gateway-appliance--software-downloads/ . Trellis users of the UMG that are operating Trellis v5.0.6 and later should install Universal Gateway firmware version 4.3.0.23 found https://www.vertiv.com/en-us/support/software-download/software/trellis-enterprise-and-quick-start-solutions-software-downloads/ .
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-18883 | The web interface of the Vertiv Avocent UMG-4000 version 4.2.1.19 is vulnerable to reflected XSS in an HTTP POST parameter. The web application does not neutralize user-controllable input before displaying to users in a web page, which could allow a remote attacker authenticated with a user account to execute arbitrary code. |
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-09-16T20:01:41.057Z
Reserved: 2019-03-01T00:00:00.000Z
Link: CVE-2019-9509
No data.
Status : Modified
Published: 2020-03-30T22:15:14.367
Modified: 2024-11-21T04:51:45.677
Link: CVE-2019-9509
No data.
OpenCVE Enrichment
No data.
EUVD