The affected versions of S+ Operations (version 2.1 SP1 and earlier) used an approach for user authentication which relies on validation at the client node (client-side authentication). This is not as secure as having the server validate a client application before allowing a connection. Therefore, if the network communication or endpoints for these applications are not protected, unauthorized actors can bypass authentication and make unauthorized connections to the server application.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-17397 | The affected versions of S+ Operations (version 2.1 SP1 and earlier) used an approach for user authentication which relies on validation at the client node (client-side authentication). This is not as secure as having the server validate a client application before allowing a connection. Therefore, if the network communication or endpoints for these applications are not protected, unauthorized actors can bypass authentication and make unauthorized connections to the server application. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 17 Sep 2024 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Authentication Bypass in Symphony Plus | Authentication Bypass in Symphony Plus |
Status: PUBLISHED
Assigner: ABB
Published:
Updated: 2024-09-17T01:36:41.524Z
Reserved: 2020-08-26T00:00:00.000Z
Link: CVE-2020-24683
No data.
Status : Modified
Published: 2020-12-22T22:15:13.757
Modified: 2024-11-21T05:15:46.077
Link: CVE-2020-24683
No data.
OpenCVE Enrichment
No data.
EUVD