A low severity vulnerability in BIPS has been identified where an attacker with high privileges or a compromised high privilege account can overwrite Read-Only smart rules via a specially crafted API request.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Beyondinsight_password_safe | Beyondtrust | 23.2 (including) | 23.2.0.1293 (excluding) |
Beyondinsight_password_safe | Beyondtrust | 23.3 (including) | 23.3.0.959 (excluding) |
Beyondinsight_password_safe | Beyondtrust | 24.1 (including) | 24.1 (including) |