Products
OpenText eDirectory
- before 9.2.6.0000
Source
security@opentext.com
Tags
CVE-2021-38133 details
Published : Sept. 12, 2024, 1:15 p.m.
Last Modified : Sept. 12, 2024, 6:14 p.m.
Last Modified : Sept. 12, 2024, 6:14 p.m.
Description
Possible External Service Interaction attack in eDirectory has been discovered in OpenText™ eDirectory. This impact all version before 9.2.6.0000.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7.4 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-521 | Weak Password Requirements | The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
Base Score
7.4
Exploitability Score
2.8
Impact Score
4.0
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
References
URL | Source |
---|---|
https://www.netiq.com/documentation/edirectory-92/edirectory926_releasenotes/data/edirectory926_releasenotes.html | security@opentext.com |
This website uses the NVD API, but is not approved or certified by it.