First published: Sun Oct 26 2014(Updated: )
The installer in IBM Security AppScan Source 8.x and 9.x through 9.0.1 has an open network port for a debug service, which allows remote attackers to obtain sensitive information by connecting to this port.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
HCL AppScan Source | =8.0 | |
HCL AppScan Source | =8.0.0.1 | |
HCL AppScan Source | =8.0.0.2 | |
HCL AppScan Source | =8.5 | |
HCL AppScan Source | =8.5.0.1 | |
HCL AppScan Source | =8.6 | |
HCL AppScan Source | =8.6.0.1 | |
HCL AppScan Source | =8.6.0.2 | |
HCL AppScan Source | =8.7 | |
HCL AppScan Source | =8.7.0.0 | |
HCL AppScan Source | =8.7.0.1 | |
HCL AppScan Source | =8.8 | |
HCL AppScan Source | =9.0 | |
HCL AppScan Source | =9.0.0.1 | |
HCL AppScan Source | =9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4812 is rated as a medium severity vulnerability due to potential exposure of sensitive information.
To fix CVE-2014-4812, it is recommended to disable the debug service or restrict access to the relevant network port.
CVE-2014-4812 affects multiple versions of HCL AppScan Source including 8.x and 9.x up to 9.0.1.
CVE-2014-4812 could potentially allow attackers to obtain sensitive information from the exposed debug service.
Yes, CVE-2014-4812 is a remote vulnerability that allows attackers to connect to an open network port.