First published: Wed Sep 01 2021(Updated: )
The user identification mechanism used by CyberArk Credential Provider prior to 12.1 is susceptible to a local host race condition, leading to password disclosure.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CyberArk Credential Provider | <12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31797 is a vulnerability in the user identification mechanism used by CyberArk Credential Provider prior to version 12.1, which is susceptible to a local host race condition, leading to password disclosure.
CVE-2021-31797 has a severity rating of 5.1, which is considered medium.
CyberArk Credential Provider versions up to but excluding 12.1 are affected by CVE-2021-31797.
To fix CVE-2021-31797, it is recommended to update CyberArk Credential Provider to version 12.1 or later.
Yes, here are some references regarding CVE-2021-31797: - [Packet Storm Security](http://packetstormsecurity.com/files/164033/CyberArk-Credential-Provider-Race-Condition-Authorization-Bypass.html) - [Full Disclosure Mailing List](http://seclists.org/fulldisclosure/2021/Sep/2) - [KoreLogic Advisory](https://korelogic.com/Resources/Advisories/KL-001-2021-009.txt)