THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-3263

Improper authentication in YMS VIS Pro

AssignerSK-CERT
Reserved2024-04-03
Published2024-05-13
Updated2024-06-06

Description

YMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions <= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.



CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-521 Weak Password Requirements

CWE-287 Improper Authentication

Product status

Default status
unaffected

Any version
affected

Timeline

2024-02-25:Vulnerability reported to SK-CERT
2024-02-26:Developer and system operator notified by SK-CERT
2024-02-27:Vulnerability confirmed by system operator
2024-04-17:Developer and system operator confirmed vulnerability fix

Credits

REMEDIATA (support@remediata.com) reporter

References

https://www.svps.sk/vis/

https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/

cve.org CVE-2024-3263

nvd.nist.gov CVE-2024-3263

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-3263
© Copyright 2024 THREATINT. Made in Cyprus with +