First published: Fri Sep 16 2022(Updated: )
When logging in to a VBASE runtime project via Web-Remote, the product uses XOR with a static initial key to obfuscate login messages. An unauthenticated remote attacker with the ability to capture a login session can obtain the login credentials.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
VISAM VBASE Pro-RT/ Server-RT (Web Remote) | =11.7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3217 is considered a high severity vulnerability due to its potential for credential theft.
To mitigate CVE-2022-3217, ensure to implement a more secure authentication method that does not rely on static keys.
CVE-2022-3217 affects users of VBASE version 11.7.0.2.
CVE-2022-3217 allows an unauthenticated remote attacker to capture and decipher login credentials.
The vulnerability CVE-2022-3217 involves the VISAM VBASE application.