First published: Thu Jun 23 2016(Updated: )
EMC Documentum WebTop 6.8 before Patch 13 and 6.8.1 before Patch 02, Documentum Administrator 7.x before 7.2 Patch 13, Documentum Capital Projects 1.9 before Patch 23 and 1.10 before Patch 10, and Documentum TaskSpace 6.7 SP3 allow remote authenticated users to bypass intended access restrictions and execute arbitrary IAPI/IDQL commands via the IAPI/IDQL interface.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum Administrator | =7.0 | |
EMC Documentum Administrator | =7.1 | |
EMC Documentum Administrator | =7.2 | |
EMC Documentum Capital Projects | =1.9 | |
EMC Documentum Capital Projects | =1.10 | |
EMC Documentum TaskSpace | =6.7-sp3 | |
EMC Documentum Webtop | =6.8 | |
EMC Documentum Webtop | =6.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0914 has a medium severity rating, indicating potential risk due to bypass of access restrictions.
To mitigate CVE-2016-0914, apply the appropriate security patches for your affected EMC Documentum software versions.
CVE-2016-0914 affects EMC Documentum WebTop 6.8 before Patch 13, WebTop 6.8.1 before Patch 02, Documentum Administrator 7.x before 7.2 Patch 13, Capital Projects 1.9 before Patch 23, 1.10 before Patch 10, and TaskSpace 6.7 SP3.
CVE-2016-0914 is an access control vulnerability that allows remote authenticated users to bypass intended restrictions.
Yes, CVE-2016-0914 can lead to unauthorized data exposure due to access control bypass.