Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-mjps-b9wy-wkgq
Vulnerability ID VCID-mjps-b9wy-wkgq
Aliases CVE-2019-12749
Summary An authentication bypass was discovered in D-Bus.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3.1 7.1 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
cvssv3.1 7.1 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
cvssv3.1 7.1 http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2019:1726
ssvc Track https://access.redhat.com/errata/RHSA-2019:1726
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2019:2868
ssvc Track https://access.redhat.com/errata/RHSA-2019:2868
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2019:2870
ssvc Track https://access.redhat.com/errata/RHSA-2019:2870
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2019:3707
ssvc Track https://access.redhat.com/errata/RHSA-2019:3707
cvssv3 7.0 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12749.json
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2019-12749
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2019-12749
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2019-12749
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2019-12749
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2019-12749
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2019-12749
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2019-12749
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2019-12749
cvssv3 7.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 7.1 https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
ssvc Track https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
cvssv3.1 7.1 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
cvssv3.1 7.1 https://seclists.org/bugtraq/2019/Jun/16
ssvc Track https://seclists.org/bugtraq/2019/Jun/16
archlinux High https://security.archlinux.org/AVG-974
cvssv3.1 7.1 https://security.gentoo.org/glsa/201909-08
ssvc Track https://security.gentoo.org/glsa/201909-08
cvssv3.1 7.1 https://usn.ubuntu.com/4015-1/
ssvc Track https://usn.ubuntu.com/4015-1/
cvssv3.1 7.1 https://usn.ubuntu.com/4015-2/
ssvc Track https://usn.ubuntu.com/4015-2/
cvssv3.1 7.1 https://www.debian.org/security/2019/dsa-4462
ssvc Track https://www.debian.org/security/2019/dsa-4462
cvssv3.1 7.1 https://www.openwall.com/lists/oss-security/2019/06/11/2
ssvc Track https://www.openwall.com/lists/oss-security/2019/06/11/2
cvssv3.1 7.1 http://www.openwall.com/lists/oss-security/2019/06/11/2
ssvc Track http://www.openwall.com/lists/oss-security/2019/06/11/2
cvssv3.1 7.1 http://www.securityfocus.com/bid/108751
ssvc Track http://www.securityfocus.com/bid/108751
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12749.json
https://api.first.org/data/v1/epss?cve=CVE-2019-12749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
108751 http://www.securityfocus.com/bid/108751
16 https://seclists.org/bugtraq/2019/Jun/16
1719344 https://bugzilla.redhat.com/show_bug.cgi?id=1719344
2 https://www.openwall.com/lists/oss-security/2019/06/11/2
2 http://www.openwall.com/lists/oss-security/2019/06/11/2
930375 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930375
ASA-201906-16 https://security.archlinux.org/ASA-201906-16
AVG-974 https://security.archlinux.org/AVG-974
dsa-4462 https://www.debian.org/security/2019/dsa-4462
GLSA-201909-08 https://security.gentoo.org/glsa/201909-08
msg00005.html https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
msg00026.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
msg00092.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
RHSA-2019:1726 https://access.redhat.com/errata/RHSA-2019:1726
RHSA-2019:2868 https://access.redhat.com/errata/RHSA-2019:2868
RHSA-2019:2870 https://access.redhat.com/errata/RHSA-2019:2870
RHSA-2019:3707 https://access.redhat.com/errata/RHSA-2019:3707
RHSA-2020:4032 https://access.redhat.com/errata/RHSA-2020:4032
RHSA-2021:0949 https://access.redhat.com/errata/RHSA-2021:0949
USN-4015-1 https://usn.ubuntu.com/4015-1/
USN-4015-2 https://usn.ubuntu.com/4015-2/
V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2019:1726
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at https://access.redhat.com/errata/RHSA-2019:1726
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2019:2868
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at https://access.redhat.com/errata/RHSA-2019:2868
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2019:2870
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at https://access.redhat.com/errata/RHSA-2019:2870
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2019:3707
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at https://access.redhat.com/errata/RHSA-2019:3707
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12749.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://seclists.org/bugtraq/2019/Jun/16
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at https://seclists.org/bugtraq/2019/Jun/16
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://security.gentoo.org/glsa/201909-08
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at https://security.gentoo.org/glsa/201909-08
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://usn.ubuntu.com/4015-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at https://usn.ubuntu.com/4015-1/
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://usn.ubuntu.com/4015-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at https://usn.ubuntu.com/4015-2/
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://www.debian.org/security/2019/dsa-4462
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at https://www.debian.org/security/2019/dsa-4462
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://www.openwall.com/lists/oss-security/2019/06/11/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at https://www.openwall.com/lists/oss-security/2019/06/11/2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at http://www.openwall.com/lists/oss-security/2019/06/11/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at http://www.openwall.com/lists/oss-security/2019/06/11/2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at http://www.securityfocus.com/bid/108751
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T19:57:51Z/ Found at http://www.securityfocus.com/bid/108751
Exploit Prediction Scoring System (EPSS)
Percentile 0.0744
EPSS Score 0.00027
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:04:41.243469+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201909-08 38.0.0