First published: Wed Aug 31 2022(Updated: )
Potential vulnerabilities have been identified in Micro Focus ArcSight Logger. The vulnerabilities could be remotely exploited resulting in Information Disclosure, or Self Cross-Site Scripting (XSS). This issue affects: Micro Focus ArcSight Logger versions prior to v7.2.2 version and prior versions.
Credit: security@microfocus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microfocus Arcsight Logger | <7.2.2 |
Micro Focus has made the following mitigation information available to resolve the vulnerabilities for the impacted versions of ArcSight Logger: • Logger 7.2.2 https://www.microfocus.com/support/downloads/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26331 is a potential vulnerability in Micro Focus ArcSight Logger that could be remotely exploited resulting in Information Disclosure or Self Cross-Site Scripting (XSS).
Micro Focus ArcSight Logger versions prior to v7.2.2 and prior versions are affected by CVE-2022-26331.
CVE-2022-26331 has a severity level of medium (6.1).
CVE-2022-26331 can be remotely exploited resulting in Information Disclosure or Self Cross-Site Scripting (XSS).
To fix CVE-2022-26331, update Micro Focus ArcSight Logger to version 7.2.2 or a later version.