First published: Fri Apr 03 2020(Updated: )
VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module allow weak hashing algorithm and insecure permissions which may allow a local attacker to bypass the password-protected mechanism through brute-force attacks, cracking techniques, or overwriting the password hash.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
VISAM VBASE Automation Base | =11.5.0.2 | |
VISAM VBASE Pro-RT/ Server-RT (Web Remote) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10601 is classified as a high-severity vulnerability due to its potential for local attackers to bypass security mechanisms.
To fix CVE-2020-10601, ensure secure hashing algorithms are implemented and permissions are properly configured to restrict unauthorized access.
CVE-2020-10601 affects users of VISAM VBASE Editor version 11.5.0.2 and the VBASE Web-Remote Module.
CVE-2020-10601 can enable local attackers to perform brute-force attacks, cracking techniques, or overwrite password hashes.
There is currently no specific patch available for CVE-2020-10601, but implementing secure practices can mitigate the risk.