First published: Fri Apr 03 2020(Updated: )
VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow an unauthenticated attacker to discover the cryptographic key from the web server and gain information about the login and the encryption/decryption mechanism, which may be exploited to bypass authentication of the HTML5 HMI web interface.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
VISAM VBASE Automation Base | =11.5.0.2 | |
VISAM VBASE Pro-RT/ Server-RT (Web Remote) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7000 is categorized as a high severity vulnerability due to the potential for unauthenticated attackers to gain sensitive information.
To remediate CVE-2020-7000, it is recommended to upgrade to a patched version of VISAM VBASE Editor or apply available security updates.
CVE-2020-7000 affects VISAM VBASE Editor version 11.5.0.2 and the VBASE Web-Remote Module.
CVE-2020-7000 can be exploited by an unauthenticated attacker to discover cryptographic keys and bypass authentication mechanisms.
Exploiting CVE-2020-7000 may lead to unauthorized access to the system and potential data breaches due to compromised login mechanisms.