public.support.unisys.com
Open in
urlscan Pro
192.59.136.205
Public Scan
URL:
https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=70
Submission: On February 28 via api from IL — Scanned from IL
Submission: On February 28 via api from IL — Scanned from IL
Form analysis
1 forms found in the DOMPOST ./NVD_Detail_Rpt.aspx?ID=70
<form method="post" action="./NVD_Detail_Rpt.aspx?ID=70" id="aspnetForm">
<div class="aspNetHidden">
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE"
value="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">
</div>
<script type="text/javascript">
restoreCheckbox();
</script>
<div class="aspNetHidden">
<input type="hidden" name="__VIEWSTATEGENERATOR" id="__VIEWSTATEGENERATOR" value="3C129C33">
<input type="hidden" name="__VIEWSTATEENCRYPTED" id="__VIEWSTATEENCRYPTED" value="">
</div>
<div id="ctl00_PageContent_pnlUpd">
<div id="ctl00_PageContent_pnlTemporal">
</div>
<table class="data">
<tbody>
<tr>
<td colspan="2"></td>
</tr>
<tr>
<td colspan="2"> </td>
</tr>
<tr>
<td style="font-weight: bold;">Unisys ID:</td>
<td>
<font><b>UIS-2024-1</b></font>
</td>
</tr>
<tr>
<td style="font-weight: bold;">Status:</td>
<td>
<font color="green">Published</font>
</td>
</tr>
<tr>
<td style="font-weight: bold;">CVE-ID:</td>
<td>CVE-2024-23758</td>
</tr>
<tr>
<td style="font-weight: bold;">Affected Product:</td>
<td>Stealth </td>
</tr>
<tr>
<td style="font-weight: bold;">Affected Version:</td>
<td>5.3.062.0 </td>
</tr>
<tr>
<td style="font-weight: bold;">Impact:</td>
<td>LOW</td>
</tr>
<tr>
<td style="font-weight: bold;">CVSS v3.1 Base Score:</td>
<td>3.9</td>
</tr>
<tr>
<td style="font-weight: bold;">CVSS v3.1 Vector:</td>
<td style="vertical-align:middle;white-space:nowrap"><b>CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N</b> <a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator" target="_blank" rel="noopener noreferrer">v3 Calculator</a></td>
</tr>
<tr>
<td style="font-weight: bold;">CVSS v2.0 Base Score:</td>
<td>0.0</td>
</tr>
<tr>
<td style="font-weight: bold;">CVSS v2.0 Vector:</td>
<td style="vertical-align:middle;white-space:nowrap">Not Supplied <a href="https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator" target="_blank" rel="noopener noreferrer">v2 Calculator</a></td>
</tr>
<tr>
<td style="font-weight: bold;white-space:nowrap; width: 150px;">CVSS Temporal Score:</td>
<td style="width: 250px;">3.4</td>
</tr>
<tr>
<td style="font-weight: bold;white-space:nowrap">Common Weakness Enumeration (CWE): </td>
<td style="width: 250px;">CWE-256</td>
</tr>
<tr>
<td style="font-weight: bold;">Common Platform Enumeration (CPE): </td>
<td style="width: 250px;">cpe:2.3:a:unisys:stealth:5.3:*:*:*:*:*:*:* </td>
</tr>
<tr>
<td style="font-weight: bold;">Source:</td>
<td>Internal Reported</td>
</tr>
<tr>
<td style="font-weight: bold;">Keyword(s):</td>
<td>WML</td>
</tr>
<tr>
<td colspan="2" style="font-weight: bold;">Vulnerability Description:</td>
</tr>
<tr>
<td colspan="2">Sensitive information (specifically clear text password information) is contained within the 5.3.062.0 version of the Enterprise ManagementInstaller_msi.log file. </td>
</tr>
<tr>
<td colspan="2" style="font-weight: bold;">System Configuration:</td>
</tr>
<tr>
<td colspan="2"></td>
</tr>
<tr>
<td colspan="2" style="font-weight: bold;">Impact of Exploiting Vulnerability:</td>
</tr>
<tr>
<td colspan="2"></td>
</tr>
<tr>
<td colspan="2" style="font-weight: bold;">Remediation Description:</td>
</tr>
<tr>
<td colspan="2">With deployment of the Stealth 5.3.062.4 software package, the EnterpriseManagerInstall_msi.log file no longer contains sensitive information.</td>
</tr>
<tr>
<td colspan="2" style="font-weight: bold;">Workaround Information:</td>
</tr>
<tr>
<td colspan="2">If you have already deployed the Stealth 5.3.062.0 software to your environment, Unisys recommends that you perform the following steps to increase the security of your environment prior to upgrading your environment to use
of the Stealth 5.3.062.4 software: 1. From the Stealth Management Server, navigate to the following directory: <stealth data="" directory="">\Stealth 2. Delete the Enterprise ManagementInstaller_msi.log file. Performing this step removes
all traces of sensitive information (specifically clear text password information) that is contained within the 5.3.062.0 version of the Enterprise ManagementInstaller_msi.log file. With deployment of the Stealth 5.3.062.4 software
package, the EnterpriseManagerInstall_msi.log file no longer contains sensitive information. </stealth>
</td>
</tr>
<tr>
<td colspan="2" style="font-weight: bold;">References:</td>
</tr>
<tr>
<td colspan="2">Announcement: Availability of the Unisys Stealth(core) 5.3 Release CTB (Client Technical Bulletin) 11722</td>
</tr>
<tr>
<td colspan="2" style="font-weight: bold;">Additional Vendor Comment:</td>
</tr>
<tr>
<td colspan="2"></td>
</tr>
</tbody>
</table>
<table>
<tbody>
<tr>
<td style="width: 138px"> </td>
</tr>
</tbody>
</table>
<table class="data">
<tbody>
<tr>
<td> </td>
</tr>
<tr>
<td colspan="2" style="text-align:center"></td>
</tr>
<tr>
<td> </td>
</tr>
<tr>
<td colspan="2">
<p class="MsoNormal" style="font-weight: normal">
<font color="red">
<span style="font-weight: normal"><em>Disclaimer: </em></span>
</font>
</p>
<font color="red">
</font>
<p class="MsoNormal" style="font-weight: normal">
<font color="red">
<em>Unisys Corporation provides the information in this Security Vulnerability Report “AS IS.” No warranties of any nature are extended by or for the information. Unisys disclaims any financial or other responsibility that may result
from your use of the information, including direct, indirect, special, or consequential damages.</em>
</font>
</p>
</td>
</tr>
</tbody>
</table>
<br>
</div>
</form>
Text Content
* Public View: Login * Contact Us * Unisys.com * Support Portal Product Support Support Home > Product Vulnerability VULNERABILITY REPORT - SENSITIVE INFORMATION IN STEALTH MANAGEMENT LOG Unisys ID: UIS-2024-1 Status: Published CVE-ID: CVE-2024-23758 Affected Product: Stealth Affected Version: 5.3.062.0 Impact: LOW CVSS v3.1 Base Score: 3.9 CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N v3 Calculator CVSS v2.0 Base Score: 0.0 CVSS v2.0 Vector: Not Supplied v2 Calculator CVSS Temporal Score: 3.4 Common Weakness Enumeration (CWE): CWE-256 Common Platform Enumeration (CPE): cpe:2.3:a:unisys:stealth:5.3:*:*:*:*:*:*:* Source: Internal Reported Keyword(s): WML Vulnerability Description: Sensitive information (specifically clear text password information) is contained within the 5.3.062.0 version of the Enterprise ManagementInstaller_msi.log file. System Configuration: Impact of Exploiting Vulnerability: Remediation Description: With deployment of the Stealth 5.3.062.4 software package, the EnterpriseManagerInstall_msi.log file no longer contains sensitive information. Workaround Information: If you have already deployed the Stealth 5.3.062.0 software to your environment, Unisys recommends that you perform the following steps to increase the security of your environment prior to upgrading your environment to use of the Stealth 5.3.062.4 software: 1. From the Stealth Management Server, navigate to the following directory: \Stealth 2. Delete the Enterprise ManagementInstaller_msi.log file. Performing this step removes all traces of sensitive information (specifically clear text password information) that is contained within the 5.3.062.0 version of the Enterprise ManagementInstaller_msi.log file. With deployment of the Stealth 5.3.062.4 software package, the EnterpriseManagerInstall_msi.log file no longer contains sensitive information. References: Announcement: Availability of the Unisys Stealth(core) 5.3 Release CTB (Client Technical Bulletin) 11722 Additional Vendor Comment: Disclaimer: Unisys Corporation provides the information in this Security Vulnerability Report “AS IS.” No warranties of any nature are extended by or for the information. Unisys disclaims any financial or other responsibility that may result from your use of the information, including direct, indirect, special, or consequential damages. Paper copies are not controlled and may be out of date; reference the Product Support Web site for current data. Terms of Use Privacy Notice © Unisys 2024 We use cookies on this site. By using this site, you agree To our use Of cookies. To change Or learn more, see our Privacy Notice.