Vulnerability Description
VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module allow weak hashing algorithm and insecure permissions which may allow a local attacker to bypass the password-protected mechanism through brute-force attacks, cracking techniques, or overwriting the password hash.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Visam | Vbase Editor | 11.5.0.2 |
| Visam | Vbase Web-Remote | All versions |
Related Weaknesses (CWE)
References
- https://www.us-cert.gov/ics/advisories/icsa-20-084-01MitigationThird Party AdvisoryUS Government Resource
- https://www.us-cert.gov/ics/advisories/icsa-20-084-01MitigationThird Party AdvisoryUS Government Resource
FAQ
What is CVE-2020-10601?
CVE-2020-10601 is a vulnerability with a CVSS score of 7.8 (HIGH). VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module allow weak hashing algorithm and insecure permissions which may allow a local attacker to bypass the password-protected mechanism throug...
How severe is CVE-2020-10601?
CVE-2020-10601 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-10601?
Check the references section above for vendor advisories and patch information. Affected products include: Visam Vbase Editor, Visam Vbase Web-Remote.