First published: Fri May 03 2002(Updated: )
Lucent VitalSuite 8.0 through 8.2, including VitalNet, VitalEvent, and VitalHelp/VitalAnalysis, allows remote attackers to bypass authentication via a direct HTTP request to the VsSetCookie.exe program, which returns a valid cookie for the desired user.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lucent Vitalevent | =8.0 | |
Lucent VitalSuite | =8.0 | |
Lucent VitalSuite | =8.2 | |
Lucent Vitalnet | =8.0 | |
Lucent VitalSuite | =8.1 | |
Lucent Vitalanalysis | =8.0 | |
Lucent Vitalhelp | =8.2 | |
Lucent Vitalanalysis | =8.2 | |
Lucent Vitalnet | =8.1 | |
Lucent Vitalhelp | =8.0 | |
Lucent Vitalevent | =8.2 | |
Lucent Vitalhelp | =8.1 | |
Lucent Vitalanalysis | =8.1 | |
Lucent Vitalnet | =8.2 | |
Lucent Vitalevent | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0236 is classified as a high severity vulnerability due to the potential for remote attackers to bypass authentication.
To fix CVE-2002-0236, ensure that you apply the latest patches provided by Lucent for all affected versions of the VitalSuite software.
CVE-2002-0236 affects Lucent VitalSuite versions 8.0 to 8.2, including VitalNet, VitalEvent, and VitalHelp/VitalAnalysis.
Yes, CVE-2002-0236 can be exploited without authentication through a direct HTTP request.
CVE-2002-0236 impacts multiple components such as VitalNet, VitalEvent, and VitalHelp/VitalAnalysis within the Lucent VitalSuite.