First published: Mon May 19 2014(Updated: )
The client in OpenText Exceed OnDemand (EoD) 8 supports anonymous ciphers by default, which allows man-in-the-middle attackers to bypass server certificate validation, redirect a connection, and obtain sensitive information via crafted responses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenText Exceed | =8.0 | |
=8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2013-6807 vulnerability is rated as high severity due to its potential to expose sensitive information through man-in-the-middle attacks.
To mitigate CVE-2013-6807, configure OpenText Exceed OnDemand to disable support for anonymous ciphers and ensure proper server certificate validation.
CVE-2013-6807 allows attackers to intercept and manipulate communications between clients and servers, potentially exposing sensitive data.
Yes, CVE-2013-6807 specifically affects version 8.0 of OpenText Exceed OnDemand.
Yes, CVE-2013-6807 can be exploited remotely, allowing attackers to perform man-in-the-middle attacks without physical access to the targeted network.