CVE-2018-13859

CVE-2018-13859

MusicCenter / Trivum Multiroom Setup Tool V8.76 – SNR 8604.26 – C4 Professional before V9.34 build 13381 – 12.07.18, allow unauthorized remote attackers to reset the authentication via the "/xml/system/setAttribute.xml" URL, using the GET request "?id=0&attr=protectAccess&newValue=0" (a successful attack will allow attackers to login without authorization).

Source: CVE-2018-13859

CVE-2018-13860

CVE-2018-13860

MusicCenter / Trivum Multiroom Setup Tool V8.76 – SNR 8604.26 – C4 Professional before V9.34 build 13381 – 12.07.18 allows unauthorized remote attackers to obtain sensitive information via the "/xml/menu/getObjectEditor.xml" URL, using a "?oid=systemSetup&id=_0" or "?oid=systemUsers&id=_0" GET request.

Source: CVE-2018-13860

CVE-2018-13862

CVE-2018-13862

Touchpad / Trivum WebTouch Setup V9 V2.53 build 13163 of Apr 6 2018 09:10:14 (FW 303) allow unauthorized remote attackers to reset the authentication via the "/xml/system/setAttribute.xml" URL, using the GET request "?id=0&attr=protectAccess&newValue=0" (a successful attack will allow attackers to login without authorization).

Source: CVE-2018-13862

CVE-2018-14345

CVE-2018-14345

An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.

Source: CVE-2018-14345