CVE-2021-45036
CVSS V2 None
CVSS V3 None
Description
Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server.
Overview
- CVE ID
- CVE-2021-45036
- Assigner
- cve-coordination@incibe.es
- Vulnerability Status
- Analyzed
- Published Version
- 2022-11-28T16:15:09.090
- Last Modified Date
- 2022-12-01T22:51:20.020
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:velneo:vclient:28.1.3:*:*:*:*:*:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://doc.velneo.com/v/32/velneo-vserver/funcionalidades/protocolo-vatps | Vendor Advisory |
https://doc.velneo.com/v/32/velneo/funcionalidades-comunes/conexion-con-velneo-vserver | Vendor Advisory |
https://doc.velneo.com/v/32/velneo/notas-de-la-version#a-partir-de-esta-version-todos-los-servidores-arrancaran-con-protocolo-vatps | Vendor Advisory |
https://doc.velneo.com/v/32/velneo/notas-de-la-version#mejoras-de-seguridad-en-validacion-de-usuario-y-contrasena | Release Notes Vendor Advisory |
https://velneo.es/mivelneo/listado-de-cambios-velneo-32/ | Release Notes Vendor Advisory |
https://www.incibe-cert.es/en/early-warning/security-advisories/velneo-vclient-improper-authentication-0 | Third Party Advisory |
https://www.velneo.com/blog/disponible-la-nueva-version-velneo-32 | Release Notes Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-45036 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45036 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-07 18:05:20 | Added to TrackCVE |