9.8
CVE-2020-14494
- EPSS 0.21%
- Veröffentlicht 20.07.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:03:23
- Quelle ics-cert@hq.dhs.gov
- CVE-Watchlists
- Unerledigt
OpenClinic GA versions 5.09.02 and 5.89.05b contain an authentication mechanism within the system that does not provide sufficient complexity to protect against brute force attacks, which may allow unauthorized users to access the system after no more than a fixed maximum number of attempts.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Openclinic Ga Project ≫ Openclinic Ga Version5.09.02
Openclinic Ga Project ≫ Openclinic Ga Version5.89.05b
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.21% | 0.41 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
CWE-307 Improper Restriction of Excessive Authentication Attempts
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.