PatchSiren cyber security CVE debrief
CVE-2016-5786 Omnimetrix CVE debrief
CVE-2016-5786 is an information disclosure issue in OmniMetrix OmniView version 1.2. The web application transmits credentials using HTTP rather than an encrypted transport, which means an attacker able to observe the network path could capture those credentials and potentially compromise accounts. NVD lists the issue as HIGH severity with a CVSS 3.0 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N.
- Vendor
- Omnimetrix
- Product
- CVE-2016-5786
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-13
- Advisory updated
- 2026-05-13
Who should care
Organizations using OmniMetrix OmniView 1.2, especially administrators responsible for web application access, network monitoring, and credential hygiene. This is most important where the interface may be reachable across shared, unmanaged, or otherwise monitorable networks.
Technical summary
The core flaw is cleartext credential transmission over HTTP in OmniView 1.2. Because the credentials are not protected in transit, they can be intercepted by a network observer. The NVD weakness classification is CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor).
Defensive priority
High. The issue directly exposes authentication material in transit and can lead to account compromise without requiring local access or user interaction, according to the published CVSS vector.
Recommended defensive actions
- Review whether OmniMetrix OmniView 1.2 is still in use and whether access to the web application is exposed beyond a trusted management network.
- Move access to encrypted transport where possible; do not allow credentials to be sent over plain HTTP.
- Restrict network paths to the application so only trusted administrative systems can reach it.
- Rotate any credentials that may have been transmitted over HTTP.
- Check the vendor and government advisory references for any product-specific mitigation guidance.
Evidence notes
All findings in this debrief are drawn from the supplied NVD record and its linked references. The source data states that OmniView 1.2 transmits credentials with the HTTP protocol and that this could be sniffed by an attacker, resulting in compromise of account credentials. NVD also provides the CVSS 3.0 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N and CWE-200 classification. Reference links include CVE.org, NVD, a SecurityFocus entry, and an ICS-CERT advisory.
Official resources
-
CVE-2016-5786 CVE record
CVE.org
-
CVE-2016-5786 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Mitigation, Third Party Advisory, US Government Resource
Publicly published on 2017-02-13; the NVD record was last modified on 2026-05-13.