Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-31833 | Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server. |
Fixes
Solution
This vulnerability has been fixed by Velneo team in version 32, released on 11/08/2022.
Workaround
No workaround given by the vendor.
References
History
Fri, 25 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Sep 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server. | Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server. |
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-04-25T14:59:40.409Z
Reserved: 2021-12-13T00:00:00.000Z
Link: CVE-2021-45036
Updated: 2024-08-04T04:32:13.641Z
Status : Modified
Published: 2022-11-28T16:15:09.090
Modified: 2024-11-21T06:31:50.397
Link: CVE-2021-45036
No data.
OpenCVE Enrichment
No data.
EUVD