Certain web application pages in the authenticated section of the Teradici Cloud Access Connector prior to v18 were accessible without the need to specify authentication tokens, which allowed an attacker in the ability to execute sensitive functions without credentials.
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://advisory.teradici.com/security-advisories/69/ | release notes vendor advisory |