First published: Fri Oct 20 2000(Updated: )
The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote attackers to spoof the eTrust administrator and gain privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ca Etrust Access Control | =5.0-sp1 | |
Ca Etrust Access Control | =4.1-sp1 | |
Broadcom Etrust Access Control | =4.1 | |
Broadcom Etrust Access Control | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0762 is rated as a high severity vulnerability due to its potential to allow remote attackers to gain administrative privileges.
To fix CVE-2000-0762, change the default encryption key used by the eTrust Access Control software.
CVE-2000-0762 affects eTrust Access Control versions 4.1-sp1 and 5.0-sp1.
Yes, CVE-2000-0762 can be exploited remotely by attackers due to its default configuration.
Organizations using eTrust Access Control with default settings are impacted by CVE-2000-0762.