We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-3263

Improper authentication in YMS VIS Pro



Description

YMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions <= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.

Reserved 2024-04-03 | Published 2024-05-13 | Updated 2024-08-01 | Assigner SK-CERT


CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-521 Weak Password Requirements

CWE-287 Improper Authentication

Product status

Default status
unaffected

Any version
affected

Timeline

2024-02-25:Vulnerability reported to SK-CERT
2024-02-26:Developer and system operator notified by SK-CERT
2024-02-27:Vulnerability confirmed by system operator
2024-04-17:Developer and system operator confirmed vulnerability fix

Credits

REMEDIATA (support@remediata.com) reporter

References

www.svps.sk/vis/

remediata.com/...263-improper-authentication-in-yms-vis-pro/

cve.org (CVE-2024-3263)

nvd.nist.gov (CVE-2024-3263)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-3263

Support options

Helpdesk Chat, Email, Knowledgebase