First published: Tue Jan 19 2021(Updated: )
In TinyCheck before commits 9fd360d and ea53de8, the installation script of the tool contained hard-coded credentials to the backend part of the tool. This information could be used by an attacker for unauthorized access to remote data.
Credit: vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kaspersky Tinycheck | <2020-12-18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35929 is classified as a medium severity vulnerability due to the potential for unauthorized access to sensitive data.
To fix CVE-2020-35929, update to a version of TinyCheck that does not contain hard-coded credentials, specifically after the commits 9fd360d and ea53de8.
The risks associated with CVE-2020-35929 include unauthorized access to the backend of TinyCheck, which can compromise remote data.
TinyCheck versions before the commit 9fd360d and up to 2020-12-18 are affected by CVE-2020-35929.
Yes, a patch is available through updated versions of TinyCheck that address the hard-coded credentials vulnerability.