CVE-2019-25279

FaceSentry Access Control System 6.4.8 contains a cleartext password storage vulnerability that allows attackers to access unencrypted credentials in the device's SQLite database. Attackers can directly read sensitive login information stored in /faceGuard/database/FaceSentryWeb.sqlite without additional authentication.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:iwt:facesentry_access_control_system_firmware:5.7.0:*:*:*:*:*:*:*
cpe:2.3:o:iwt:facesentry_access_control_system_firmware:5.7.2:*:*:*:*:*:*:*
cpe:2.3:o:iwt:facesentry_access_control_system_firmware:6.4.8:*:*:*:*:*:*:*
cpe:2.3:h:iwt:facesentry_access_control_system:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-08 00:15

Updated : 2026-01-16 19:16


NVD link : CVE-2019-25279

Mitre link : CVE-2019-25279

CVE.ORG link : CVE-2019-25279


JSON object : View

Products Affected

iwt

  • facesentry_access_control_system
  • facesentry_access_control_system_firmware
CWE
CWE-312

Cleartext Storage of Sensitive Information