In Unisys Stealth (core) before 6.0.025.0, the Keycloak password is stored in a recoverable format that might be accessible by a local attacker, who could gain access to the Management Server and change the Stealth configuration.
References
Link | Resource |
---|---|
https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=62 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-03-18T04:03:39
Updated: 2021-03-18T04:03:39
Reserved: 2021-01-13T00:00:00
Link: CVE-2021-3141
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-03-18T05:15:13.913
Modified: 2021-03-25T16:33:06.703
Link: CVE-2021-3141
JSON object: View
Redhat Information
No data.
CWE