Verax NMS prior to 2.10 allows authentication via the encrypted password without knowing the cleartext password.
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
Link | Tags |
---|---|
http://www.securityfocus.com/bid/58334 | third party advisory vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/82704 | third party advisory vdb entry |
https://andrewbrooksblog.wordpress.com/2013/03/03/verax-nms-13-cve-2013-1351/ | third party advisory exploit |