Velneo vClient on its 28.1.3 version, does not correctly check the certificate of authenticity by default. This could allow an attacker that has access to the network to perform a MITM attack in order to obtain the user´s credentials.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-31832 | Velneo vClient on its 28.1.3 version, does not correctly check the certificate of authenticity by default. This could allow an attacker that has access to the network to perform a MITM attack in order to obtain the user´s credentials. |
Fixes
Solution
This vulnerability has been fixed by Velneo team in the 29.2 version, released on 29/06/2021.
Workaround
No workaround given by the vendor.
References
History
Thu, 22 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-05-22T18:24:43.357Z
Reserved: 2021-12-13T00:00:00.000Z
Link: CVE-2021-45035
Updated: 2024-08-04T04:32:13.611Z
Status : Modified
Published: 2022-09-23T16:15:10.380
Modified: 2024-11-21T06:31:50.263
Link: CVE-2021-45035
No data.
OpenCVE Enrichment
No data.
EUVD