Vulnerability Description
A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user. NOTE: the vendor disputes this because the password is not hardcoded (it can be changed during installation or at any later time).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Iongroup | Wallstreet Suite | 7.4.83 |
Related Weaknesses (CWE)
References
- https://cds.thalesgroup.com/en/tcs-cert/CVE-2021-41320
- https://client-connect.iongroup.com/library/content/treasury-management/wallstre
- https://excellium-services.com/cert-xlm-advisory/CVE-2021-41320Third Party Advisory
- https://iongroup.com/ion-treasury/products/wallstreet-suite/ProductVendor Advisory
- https://client-connect.iongroup.com/library/content/treasury-management/wallstre
- https://excellium-services.com/cert-xlm-advisory/CVE-2021-41320Third Party Advisory
- https://iongroup.com/ion-treasury/products/wallstreet-suite/ProductVendor Advisory
FAQ
What is CVE-2021-41320?
CVE-2021-41320 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user. NOTE: the vendor disputes this because the passwor...
How severe is CVE-2021-41320?
CVE-2021-41320 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-41320?
Check the references section above for vendor advisories and patch information. Affected products include: Iongroup Wallstreet Suite.