Description
When logging in to a VBASE runtime project via Web-Remote, the product uses XOR with a static initial key to obfuscate login messages. An unauthenticated remote attacker with the ability to capture a login session can obtain the login credentials.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42631 | When logging in to a VBASE runtime project via Web-Remote, the product uses XOR with a static initial key to obfuscate login messages. An unauthenticated remote attacker with the ability to capture a login session can obtain the login credentials. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2022-31 |
|
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-03T01:00:10.565Z
Reserved: 2022-09-14T00:00:00.000Z
Link: CVE-2022-3217
No data.
Status : Modified
Published: 2022-09-16T22:15:12.247
Modified: 2024-11-21T07:19:04.450
Link: CVE-2022-3217
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD