CVE Details for CVE: CVE-2013-0148
Summary
The Data Camouflage (aka FairCom Standard Encryption) algorithm in FairCom c-treeACE does not ensure that a decryption key is needed for accessing database contents, which allows context-dependent attackers to read cleartext database records by copying a database to another system that has a certain default configuration.
Timestamps
Last major update 20-01-2017 - 02:59
Published 16-06-2013 - 17:55
Last modified 20-01-2017 - 02:59
Vulnerable Configurations
  • cpe:2.3:a:faircom:c-treeace:-:*:*:*:*:*:*:*
    cpe:2.3:a:faircom:c-treeace:-:*:*:*:*:*:*:*
CAPEC
Click the CAPEC title to display a description
  • An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
CWE
CVSS
Base
7.1
Impact
6.9
Exploitability
8.6
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE NONE NONE
CVSS3
None
VIA4 references
cvss-vector via4
AV:N/AC:M/Au:N/C:C/I:N/A:N
refmap via4
cert-vn VU#900031