Vulnerability Details CVE-2019-7323
GUP (generic update process) in LightySoft LogMX before 7.4.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update. The update process relies on cleartext HTTP. The attacker could replace the LogMXUpdater.class file.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 49.1%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.1
Products affected by CVE-2019-7323
-
cpe:2.3:a:logmx:logmx:7.0.0
-
cpe:2.3:a:logmx:logmx:7.1.0
-
cpe:2.3:a:logmx:logmx:7.2.0
-
cpe:2.3:a:logmx:logmx:7.3.0