First published: Wed Jul 27 2022(Updated: )
VISAM VBASE version 11.6.0.6 is vulnerable to improper access control via the web-remote endpoint, which may allow an unauthenticated user viewing access to folders and files in the directory listing.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
VISAM VBASE | =11.6.0.6 | |
VISAM VBASE Pro-RT/ Server-RT (Web Remote) | =11.6.0.6 |
VISAM recommends users update to VBASE v11.7.0.2 or later. Users may obtain a download link by submitting a request form. For more information, please contact VISAM using the information provided on the company contact page.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38417 has a severity rating of medium due to its improper access control vulnerabilities.
To fix CVE-2021-38417, you should implement proper access controls to restrict unauthenticated user access to sensitive directories and files.
CVE-2021-38417 affects users of VISAM VBASE version 11.6.0.6 using the web-remote endpoint.
CVE-2021-38417 is classified as an improper access control vulnerability.
Yes, CVE-2021-38417 can be exploited remotely by unauthenticated users to access restricted folders and files.