{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T17:57:25.713","vulnerabilities":[{"cve":{"id":"CVE-2018-5408","sourceIdentifier":"cret@cert.org","published":"2019-05-08T15:30:52.987","lastModified":"2024-11-21T04:08:45.800","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not validate, or incorrectly validates, the PrinterLogic management portal's SSL certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host."},{"lang":"es","value":"El programa PrinterLogic Print Management, hasta la versión 18.3.1.96 incluyendola, no válida, o válida incorrectamente, el certificado SSL del portal de administración de PrinterLogic. Cuando un certificado no es válido o es malicioso, podría permitir a un atacante falsificar una entidad de confianza mediante el uso de un ataque de tipo man-in the-middel (MITM). El programa puede conectarse a un host malicioso mientras cree que es un host de confianza, o el programa puede ser burlado para aceptar datos falsificados que parecen provenir de un host de confianza."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:N","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:M\/Au:N\/C:P\/I:P\/A:N","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cret@cert.org","type":"Secondary","description":[{"lang":"en","value":"CWE-295"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-295"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:printerlogic:print_management:*:*:*:*:*:*:*:*","versionEndIncluding":"18.3.1.96","matchCriteriaId":"092E9A95-4811-4796-8B18-24BF4F0EEE1D"}]}]}],"references":[{"url":"http:\/\/www.securityfocus.com\/bid\/108285","source":"cret@cert.org"},{"url":"https:\/\/kb.cert.org\/vuls\/id\/169249\/","source":"cret@cert.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http:\/\/www.securityfocus.com\/bid\/108285","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/kb.cert.org\/vuls\/id\/169249\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}