CVE-2000-0762

The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote attackers to spoof the eTrust administrator and gain privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:broadcom:etrust_access_control:4.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:etrust_access_control:5.0:*:*:*:*:*:*:*
cpe:2.3:a:ca:etrust_access_control:4.1:sp1:*:*:*:*:*:*
cpe:2.3:a:ca:etrust_access_control:5.0:sp1:*:*:*:*:*:*

History

No history.

Information

Published : 2000-10-20 04:00

Updated : 2024-02-04 16:31


NVD link : CVE-2000-0762

Mitre link : CVE-2000-0762

CVE.ORG link : CVE-2000-0762


JSON object : View

Products Affected

ca

  • etrust_access_control

broadcom

  • etrust_access_control