Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-31833 Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server.
Fixes

Solution

This vulnerability has been fixed by Velneo team in version 32, released on 11/08/2022.


Workaround

No workaround given by the vendor.

History

Fri, 25 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Sep 2024 17:45:00 +0000

Type Values Removed Values Added
Description Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server. Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server.

cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-04-25T14:59:40.409Z

Reserved: 2021-12-13T00:00:00.000Z

Link: CVE-2021-45036

cve-icon Vulnrichment

Updated: 2024-08-04T04:32:13.641Z

cve-icon NVD

Status : Modified

Published: 2022-11-28T16:15:09.090

Modified: 2024-11-21T06:31:50.397

Link: CVE-2021-45036

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.