First published: Fri Feb 14 2014(Updated: )
BlackBerry Enterprise Service 10 before 10.2.1, Universal Device Service 6, Enterprise Server Express for Domino through 5.0.4, Enterprise Server Express for Exchange through 5.0.4, Enterprise Server for Domino through 5.0.4 MR6, Enterprise Server for Exchange through 5.0.4 MR6, and Enterprise Server for GroupWise through 5.0.4 MR6 log cleartext credentials during exception handling, which might allow context-dependent attackers to obtain sensitive information by reading a log file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BlackBerry Enterprise Server | =10.0 | |
BlackBerry Enterprise Server | =10.1.0 | |
BlackBerry Enterprise Server | =10.1.2 | |
BlackBerry Enterprise Server | =10.2.0 | |
Blackberry Universal Device Service | =6.0 | |
BlackBerry Enterprise Server | <=5.0.4 | |
BlackBerry Enterprise Server | <=5.0.4 | |
BlackBerry Enterprise Server | <=5.0.4 | |
BlackBerry Enterprise Server Express | <=5.0.4 | |
BlackBerry Enterprise Server Express | <=5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1467 has a medium severity rating and could allow unauthorized access to sensitive information.
CVE-2014-1467 affects several versions of BlackBerry Enterprise Service and BlackBerry Universal Device Service.
To fix CVE-2014-1467, update your BlackBerry software to the latest version that addresses the vulnerability.
Yes, if exploited, CVE-2014-1467 could result in data breaches by allowing unauthorized access to sensitive information.
There are no documented workarounds for CVE-2014-1467, so it is recommended to apply patches as soon as possible.