The default configuration of Persistent Accelerite Radia Client Automation (formerly HP Client Automation) 7.9 through 9.1 before 2015-02-19 enables a remote Notify capability without the Extended Notify Security features, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securitytracker.com/id/1033862 - | |
References | () https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features - Vendor Advisory |
Information
Published : 2015-10-19 18:59
Updated : 2024-11-21 02:37
NVD link : CVE-2015-7863
Mitre link : CVE-2015-7863
CVE.ORG link : CVE-2015-7863
JSON object : View
Products Affected
accelerite
- radia_client_automation
CWE
CWE-254
7PK - Security Features