Exploit Report

Computer Security And Bug Information

CVE-2021-45035

CVECVE-2021-45035
CVE Ordinal Value222907
Published Date2022-09-23T16:15Z
Modified Date2022-09-23T16:31Z
DescriptionVelneo vClient on its 28.1.3 version, does not correctly check the certificate of authenticity by default. This could allow an attacker that has access to the network to perform a MITM attack in order to obtain the user´s credentials.
References
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://www.incibe-cert.es/en/early-warning/security-advisories/velneo-vclient-improper-authentication
Reference DescriptionCONFIRM https://www.incibe-cert.es/en/early-warning/security-advisories/velneo-vclient-improper-authentication
Reference URLhttps://velneo.es/publicacion-de-incidencia-de-seguridad-en-cve-cve-2021-45035/
Reference DescriptionCONFIRM https://velneo.es/publicacion-de-incidencia-de-seguridad-en-cve-cve-2021-45035/
Sources NIST MITRE
Note
  • No CVSS data for this CVE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles