Description
The client in OpenText Exceed OnDemand (EoD) 8 supports anonymous ciphers by default, which allows man-in-the-middle attackers to bypass server certificate validation, redirect a connection, and obtain sensitive information via crafted responses.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2013-6609 | The client in OpenText Exceed OnDemand (EoD) 8 supports anonymous ciphers by default, which allows man-in-the-middle attackers to bypass server certificate validation, redirect a connection, and obtain sensitive information via crafted responses. |
References
| Link | Providers |
|---|---|
| https://github.com/koto/exceed-mitm |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T17:46:23.564Z
Reserved: 2013-11-17T00:00:00.000Z
Link: CVE-2013-6807
No data.
Status : Modified
Published: 2014-05-19T14:55:09.783
Modified: 2026-05-06T22:30:45.220
Link: CVE-2013-6807
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD