IBM Security Verify Access impacted by dozens of bugs

Malicious multi-factor authenticators could be added by threat actors to ISVA through the abuse of the solution’s authentication bypass issue and back-end access, which could then allow complete infrastructure takeovers, noted Barre. “Note that even with network restrictions, a low privileged user on a trusted machine can fully compromise the authentication solution, since the back-end used to manage the entire authentication infrastructure can be reached without authentication by sending a specific HTTP header,”

Source: SC Magazine

 


Date:

Categorie(s):