First published: Wed Apr 26 2023(Updated: )
Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
VISAM VBASE Pro-RT/ Server-RT (Web Remote) | <11.7.5 | |
VISAM VBASE |
VISAM recommends users update to VBASE 11.7.5 or later. The update can be performed via the VBASE Editor update dialog on machines with secure access to the internet. Users of machines without internet access must manually update by submitting a request form https://www.vbase.net/en/download.php to receive a download link.For more information, users should contact VISAM using the information provided on their contact page https://www.visam.com/kontakt.php (German language).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45876 is considered a medium severity vulnerability due to potential information disclosure.
To fix CVE-2022-45876, upgrade VBASE Automation Base to version 11.7.5 or later.
CVE-2022-45876 affects versions of VISAM VBASE Automation Base prior to 11.7.5.
CVE-2022-45876 may disclose sensitive information if a valid user opens a specially crafted file.
Valid users of VISAM VBASE Automation Base versions prior to 11.7.5 are impacted by CVE-2022-45876.