Vulnerability Details : CVE-2021-45036
Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server.
Published
2022-11-28 16:15:09
Updated
2024-09-16 18:15:49
Products affected by CVE-2021-45036
- cpe:2.3:a:velneo:vclient:28.1.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-45036
0.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-45036
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.7
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N |
2.2
|
5.8
|
Spanish National Cybersecurity Institute, S.A. (INCIBE) | |
7.4
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
2.2
|
5.2
|
NIST |
CWE ids for CVE-2021-45036
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
-
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.Assigned by:
- cve-coordination@incibe.es (Secondary)
- nvd@nist.gov (Primary)
-
The product records password hashes in a data store, receives a hash of a password from a client, and compares the supplied hash to the hash obtained from the data store.Assigned by: cve-coordination@incibe.es (Secondary)
References for CVE-2021-45036
-
https://doc.velneo.com/v/32/velneo/notas-de-la-version#a-partir-de-esta-version-todos-los-servidores-arrancaran-con-protocolo-vatps
Notas de la versión - Documentación de VelneoVendor Advisory
-
https://www.incibe-cert.es/en/early-warning/security-advisories/velneo-vclient-improper-authentication-0
Velneo vClient improper authentication | INCIBE-CERTThird Party Advisory
-
https://www.incibe.es/en/incibe-cert/notices/aviso/velneo-vclient-improper-authentication-0
Velneo vClient improper authentication | INCIBE-CERT | INCIBE
-
https://velneo.es/mivelneo/listado-de-cambios-velneo-32/
Listado de cambios Velneo 32.0 | VelneoRelease Notes;Vendor Advisory
-
https://doc.velneo.com/v/32/velneo/notas-de-la-version#mejoras-de-seguridad-en-validacion-de-usuario-y-contrasena
Notas de la versión - Documentación de VelneoRelease Notes;Vendor Advisory
-
https://www.velneo.com/blog/disponible-la-nueva-version-velneo-32
Nueva versión Velneo 32Release Notes;Vendor Advisory
-
https://doc.velneo.com/v/32/velneo/funcionalidades-comunes/conexion-con-velneo-vserver
Conexión con Velneo vServer - Documentación de VelneoVendor Advisory
-
https://doc.velneo.com/v/32/velneo-vserver/funcionalidades/protocolo-vatps
Vendor Advisory
Jump to