Vulnerability Description
An issue was discovered in VeridiumID VeridiumAD 2.5.3.0. The HTTP request to trigger push notifications for VeridiumAD enrolled users does not enforce proper access control. A user can trigger push notifications for any other user. The text contained in the push notification can also be modified. If a user who receives the notification accepts it, then the user who triggered the notification can obtain the accepting user's login certificate.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Veridiumid | Veridiumad | 2.5.3.0 |
Related Weaknesses (CWE)
References
- https://www.compass-security.com/en/research/advisoriesThird Party Advisory
- https://www.compass-security.com/fileadmin/Research/Advisories/2022_03_CSNC-2021Third Party Advisory
- https://www.veridiumid.com/press/veridium-eliminates-passwords-with-veridiumad-fProductVendor Advisory
- https://www.compass-security.com/en/research/advisoriesThird Party Advisory
- https://www.compass-security.com/fileadmin/Research/Advisories/2022_03_CSNC-2021Third Party Advisory
- https://www.veridiumid.com/press/veridium-eliminates-passwords-with-veridiumad-fProductVendor Advisory
FAQ
What is CVE-2021-42791?
CVE-2021-42791 is a vulnerability with a CVSS score of 7.3 (HIGH). An issue was discovered in VeridiumID VeridiumAD 2.5.3.0. The HTTP request to trigger push notifications for VeridiumAD enrolled users does not enforce proper access control. A user can trigger push n...
How severe is CVE-2021-42791?
CVE-2021-42791 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-42791?
Check the references section above for vendor advisories and patch information. Affected products include: Veridiumid Veridiumad.