7.5
Advisory Published
Updated

CVE-2022-3217

First published: Fri Sep 16 2022(Updated: )

When logging in to a VBASE runtime project via Web-Remote, the product uses XOR with a static initial key to obfuscate login messages. An unauthenticated remote attacker with the ability to capture a login session can obtain the login credentials.

Credit: vulnreport@tenable.com

Affected SoftwareAffected VersionHow to fix
VISAM VBASE Pro-RT/ Server-RT (Web Remote)=11.7.0.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-3217?

    CVE-2022-3217 is considered a high severity vulnerability due to its potential for credential theft.

  • How do I fix CVE-2022-3217?

    To mitigate CVE-2022-3217, ensure to implement a more secure authentication method that does not rely on static keys.

  • Who is affected by CVE-2022-3217?

    CVE-2022-3217 affects users of VBASE version 11.7.0.2.

  • What kind of attack is possible with CVE-2022-3217?

    CVE-2022-3217 allows an unauthenticated remote attacker to capture and decipher login credentials.

  • What products are involved in CVE-2022-3217?

    The vulnerability CVE-2022-3217 involves the VISAM VBASE application.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203