In Unisys Stealth (core) before 6.0.025.0, the Keycloak password is stored in a recoverable format that might be accessible by a local attacker, who could gain access to the Management Server and change the Stealth configuration.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-26488 | In Unisys Stealth (core) before 6.0.025.0, the Keycloak password is stored in a recoverable format that might be accessible by a local attacker, who could gain access to the Management Server and change the Stealth configuration. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T16:45:51.259Z
Reserved: 2021-01-13T00:00:00
Link: CVE-2021-3141
No data.
Status : Modified
Published: 2021-03-18T05:15:13.913
Modified: 2024-11-21T06:20:58.807
Link: CVE-2021-3141
No data.
OpenCVE Enrichment
No data.
EUVD