A lack of authentication, in CA Unified Infrastructure Management 8.5.1, 8.5, and 8.4.7, allows remote attackers to conduct a variety of attacks, including file reading/writing.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Unified_infrastructure_management | Ca | 8.4.7 (including) | 8.4.7 (including) |
Unified_infrastructure_management | Ca | 8.5 (including) | 8.5 (including) |
Unified_infrastructure_management | Ca | 8.5.1 (including) | 8.5.1 (including) |