End-users can potentially exploit the vulnerability to exclude audit trails from being recorded on the client side.
Metrics
Affected Vendors & Products
Solution
Audit trails will be captured on the server side instead of the client side, thereby eliminating the vulnerability and its impact Apply the following patch builds in your data center. Secure Content Manager 24.3 Patch 1: Patch 219146 - Content Manager 24.3 Patch 1 Build 86 Secure Content Manager 24.2 Patch 1: Patch 219145 - Content Manager 24.2 Patch 1 Build 123 Secure Content Manager 23.4 Patch 2: Patch 1593502 - Content Manager 23.4 Patch 2 Build 240 Secure Content Manager 10.1 Patch 6: Patch 1593711 – Content Manager 10.1 Patch 6 Build 1185
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://portal.microfocus.com/s/article/KM000036389? |
![]() ![]() |
Tue, 26 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 22 Nov 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | : Insufficient Logging vulnerability in OpenText Secure Content Manager on Windows allows Audit Log Manipulation.This issue affects Secure Content Manager: from 10.1 before <24.4. End-users can potentially exploit the vulnerability to exclude audit trails from being recorded on the client side. | |
Title | Client-side audit exclusion vulnerability | |
Weaknesses | CWE-778 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: OpenText
Published:
Updated: 2024-11-26T14:19:22.506Z
Reserved: 2024-11-05T14:11:06.490Z
Link: CVE-2024-10863

Updated: 2024-11-22T17:46:11.859Z

Status : Received
Published: 2024-11-22T16:15:21.257
Modified: 2024-11-22T16:15:21.257
Link: CVE-2024-10863

No data.

No data.