Mitigations: The issue is corrected in the upcoming patch update for each affected product. Product overlays and workaround instructions are available through OpenText Support. The vulnerable configurations are believed to be uncommon.
Administrators can test for the vulnerability in their installations by attempting to sign on to a Visual COBOL or Enterprise Server component such as ESCWA using a valid username and incorrect password.
Metrics
Affected Vendors & Products
Solution
Install 7.0 Patch Update 21, 8.0 Patch Update 10, or 9.0 Patch Update 2, or later, when available. Hotfix overlays are available now for common platforms and can be produced for other platforms; contact OpenText Support to request a hotfix overlay.
Workaround
Contact OpenText Support for workaround details.
Link | Providers |
---|---|
https://portal.microfocus.com/s/article/KM000021287 |
![]() ![]() |
Thu, 26 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Opentext
Opentext visual Cobal Cobal Server Enterprise Developer Enterprise Server |
|
CPEs | cpe:2.3:a:opentext:visual_cobal_cobal_server_enterprise_developer_enterprise_server:*:*:*:*:*:*:*:* | |
Vendors & Products |
Opentext
Opentext visual Cobal Cobal Server Enterprise Developer Enterprise Server |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: OpenText
Published:
Updated: 2024-09-26T14:08:41.901Z
Reserved: 2023-08-23T18:01:40.973Z
Link: CVE-2023-4501

Updated: 2024-08-02T07:31:06.347Z

Status : Modified
Published: 2023-09-12T19:15:36.333
Modified: 2024-11-21T08:35:18.020
Link: CVE-2023-4501

No data.

No data.