public.support.unisys.com Open in urlscan Pro
192.59.136.205  Public Scan

URL: https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=70
Submission: On February 28 via api from IL — Scanned from IL

Form analysis 1 forms found in the DOM

POST ./NVD_Detail_Rpt.aspx?ID=70

<form method="post" action="./NVD_Detail_Rpt.aspx?ID=70" id="aspnetForm">
  <div class="aspNetHidden">
    <input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE"
      value="Jney78kxkuWUmk+Fqr57OdJJ4KFVYNpMWmSnCosQq3ixP5ox8KPm/wV6khJL3VjwBUiS4FjHEMAC5XGmbTHDQK7naSUPSAW/ELW0rKmeU54+RNCfzUh0MUBDkAju5v7UtF2QAir0pu9pmRth7Q9t8Vq9nUOa+Hh3yktX+UyRqSRvnOLC9mk+YjH8PUCdqKue5F4s+s/qHENS3SrLc4loCPb67EZ4tRVI2NqYQzxlJ3hNzTQBss6PWGqaoJsXowCsgopi6ImlHwEYcVzUGCypBV83pm6btqghYAPILA7VvxoE+BOhEqQOXPWvMgySDKHe/47kP8VXldb5+nRuLfbvs4Z7Qf7weB1VY5/8s8zaY7mt/LH6b0biGNqI11LYENY5kl9LTAw0Jp4QF/Y367xEsQthHAusHZOuoU9bnDML8zse5Q3fYoX6o4gab8b+CbVYwHCxrqwybT0XdGooIRK4IMHPD+88q2njS5OGc3kSQ/FJJpFz4zzV+z/R05pWc8VKLtNfpv2/urS1rzjjrWPPYwY7dt9heAJn7lZv9QwhDLZ5TqHDW6QPgIl4+RdOOuQTcn6ledANY7EPnpA1Sj0urrgguL3uTvE/IHq0apRzdVtQfB5EMOE/i9hA39AqPC6IoiHU6Qzi8tsE9bcLSIQzn8WlHU1EimOlek2SznCtIBb6SgHV4MHa+Cmi7F2HOic/9XSrfvIS2JroqlyBpqVUS5+e6fqnJFRitakKgQ6XgF87pT8atXGg36uvFpo8cDKpyC/gI+mkYIjR4GoB1lBKqJsWvSZ4ftUn0OfKBMZgAkTIiobx6V5xqVjjMcuU5Zw0oKZYUXcIPWfE85wu53u/Y1GrdSQB/t8+4ppjUA0V9T44urLcHJMgDtHnRhpkZG8DeaqCWa4ryIRpFYRX6yCMSjrEw7DhCK6+mtBctMU9pwBnaZlTX4RB0oZoF8GwIuq2k7dIcN95mOjroZNPATto9JLa3Rov5U5lL6hc1la0FOJ04K0MGRvdrTFI/g76qCSvKAbeSuog2sgX2dgU6dj7+sKAEo3X8OUXQX4k/zyer0zRgTgeGZJeXSuUEr23DO9RFErumZPSB+lUVLZJmJuB/EGITGuc8JqaiUZAKR8BQn1NFpDNnK52EtmFDYUlzMiI5taRjFCLrYILECWEqueTFaI1IQKQuFzmxvRFW/O9EccsxA2n4abMi1cUo6du6ktC3AzpKGMZd3phonFS73qdCHdMgP4ycntpoqDfhrW4mRys7V9H8fbjImUQ0RNovuROR+9cKqcDkLl/C5aTExHKLDdtptigSN/aMnmFjbHoUvmuVZhCGZOxN+fYpMqrNdFXRaoKJWdGHU2PuUg/YbeQLnR7vdGahJPqTQoyvdszj2b3BBNRIJtPJyEGLO5LOmdZAS5nHSgfkK6rD2LrFOHErwEerAWAOzD33lY5smthEWyrXQOy6Q/UObOD3IJN0Ze/mGoNdZJ5Bxj7/FZtf4oCLaPo6wr2a3Rj5woszBNBxhW2KPWp5mkB1E9hkXp2ePaMKSbth70TBXqDWsdjxz5o30zRQLIbhxc03vZQdqESmmWlcTbnOufNSMDocMz66iRe8tWXbJfKT/bhwrgGMaSsXcbqblx3tYjVtIzCOAOEl8FjZXJXaYTgbzmUNseGsJJxEdMthcs+Rjo4h5ZYWCVdbqUa9xHXdWWAin83P6QS5dPVmAwf0kgKlTdXJLGwE8BQRECtavWzjwAfLeRYbCuvBDhd8/IZY9CUDSsTugjA8X1KQ2Bcij3NfjvSScAP+N8UukbnoVgKlSwjaQuDVaJpZsJCMRuhQTGZyxEHzUA1tZp2TUqNDGS515vAm73VgNI8t0peQfdIbr+3ZSypiRiLCim4b2SBKjyk9d01XJTbJ7WL+nb2ogFvQg2CtzqzoZgnAMJA8LZZazvB43Zyvba+M5afUosVH1tSyBK0pkvvU38G6PDCTDiOG8cVFclB+KjHyISG8ZK7yonlSqdpM6jesOc7HTs6VgclrxuO4v/gr3PoG6mIaQjBluRUBi1FN6YaHNTlg2yMZhCW9lARpFbUifjZlwjKKfyCkUrnlcxWXdHx1cndBVPRFyMPeabTyJrr2X8qAqT1m8LhgtLlBEzKBp7DvMSN4eEFnVBIu68gX1W/SJXmegYye1lHzmSGLVECitWEn57mRZARFJCk//fje2W66gnsXbjdBOSgm/gfmlT5vNfltqp9OW+46KvIs5NBOC9eTqcKLe39GlONSJF0mkwqIWRMoqrEotml+N2Ei8NNS6X2iOCjj604+RyJy2SOFxTBN6AjZyNgMDIIQJyKxDuRu6qeBFqS4B87c7fUsoktVMnI3Ko/gzQ1OJzvfosAZCtHm7DWylFg1/MxSq9K8U8/pSEpGEQ8Ue2Mnu+2q+k8+HOZDzo08DHjBz6lRgbLAh4KNv9RjPHlGB8SAGG5JBaC/RpyqZEMdydfaMNU5UkOQRuWllKkk5qsMz0dC7TsS0zH4e3qEWwE2zsKfUhfLa6FkBo2xi3QgkLeq3BpRLuoOvlZkhct5uf2q6RqGRA22cOCOlO81+aPTi9lIbm7+MDhtqri5XqZDdRvVU0nQW+ATMjh/BSCWYawSEp0qlYiFYGMNTR/iqfTdUH9PpilUn0EIzj0gDNE/b6j9l648zs7utBZGouIhPJBiQy/CvE98kK8P5PJYB+5jL/IseD+8CuI+qQ5vpOXzl3xnct3zOSESzoTOTvpQCJ05cF28CWzHL+oqM5It+ef9DuY9yowIxNnpae72dAnZr2GPRQLGG0MSWTogUBmxGgLhvi/jD+nDkCrBLnpqoKVYtvZZhkZwyrB6H0XjzbQCX3fWCpBp5y2IWGsoxLkX2s+GnjfJrVXFxX4GFVmFj2eTrVMTIqLtzstiitMukl2ibpjcpPERn9jgVrh+vX+XQxXVbMs+cfEl99ZfIv2ySiyw7ZzEla7s+zd1EcERAdebHyxDyNs0JQeXhPfLCy0pRKlxXpvrLLTJPqBNE3ikoU3lAqpBXd8xDa28RASLroNM4UWjvMsihlOuA1OGyEi1NsBP1cl5k0tA+f7A86I+96YVCHFRadEbBCSnpWQHeE9Hj6jeUX9SMHQmTTIf6YxWjPAXRACxgIGQ2aKbm7ke3LxqdRPUKo2Kj0N2VbY1BDostMor/pq9visMRUHsH1Cr/qeKdl+fNOsBctLd1Zw6AqR5Z4/nasnLjRVIliZCBbnsQAzbBALuqWYc5rr5UWiApNt+SDMlpby6ui2oY5yklEnZe0NXmfe7gq13C78bzWndPpWjr+8UKiGy2g5MiA4I5frECS8UVNch/JTAAJvhbDhQKOzuuHizf115Z3GAr3+99gXvcEKc/9RPBXjzQiRZiZ+QScngnVnecP2y4Eou5gh3mCIJ6KD8wKeAJRk60cXG2yNfqUmJUBMelEvKEz0dSNQrdft8XzP3UqR9H6PpNIsa62V/wnzKTKFVXjgY86shJ6xCkcsKWjTKW9a11p/VdVjsBEFJFq/iAdYB2D6eTGDU9TE18tPIw==">
  </div>
  <script type="text/javascript">
    restoreCheckbox();
  </script>
  <div class="aspNetHidden">
    <input type="hidden" name="__VIEWSTATEGENERATOR" id="__VIEWSTATEGENERATOR" value="3C129C33">
    <input type="hidden" name="__VIEWSTATEENCRYPTED" id="__VIEWSTATEENCRYPTED" value="">
  </div>
  <div id="ctl00_PageContent_pnlUpd">
    <div id="ctl00_PageContent_pnlTemporal">
    </div>
    <table class="data">
      <tbody>
        <tr>
          <td colspan="2"></td>
        </tr>
        <tr>
          <td colspan="2">&nbsp;</td>
        </tr>
        <tr>
          <td style="font-weight: bold;">Unisys ID:</td>
          <td>
            <font><b>UIS-2024-1</b></font>
          </td>
        </tr>
        <tr>
          <td style="font-weight: bold;">Status:</td>
          <td>
            <font color="green">Published</font>
          </td>
        </tr>
        <tr>
          <td style="font-weight: bold;">CVE-ID:</td>
          <td>CVE-2024-23758</td>
        </tr>
        <tr>
          <td style="font-weight: bold;">Affected Product:</td>
          <td>Stealth </td>
        </tr>
        <tr>
          <td style="font-weight: bold;">Affected Version:</td>
          <td>5.3.062.0 </td>
        </tr>
        <tr>
          <td style="font-weight: bold;">Impact:</td>
          <td>LOW</td>
        </tr>
        <tr>
          <td style="font-weight: bold;">CVSS v3.1 Base Score:</td>
          <td>3.9</td>
        </tr>
        <tr>
          <td style="font-weight: bold;">CVSS v3.1 Vector:</td>
          <td style="vertical-align:middle;white-space:nowrap"><b>CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N</b> &nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator" target="_blank" rel="noopener noreferrer">v3 Calculator</a></td>
        </tr>
        <tr>
          <td style="font-weight: bold;">CVSS v2.0 Base Score:</td>
          <td>0.0</td>
        </tr>
        <tr>
          <td style="font-weight: bold;">CVSS v2.0 Vector:</td>
          <td style="vertical-align:middle;white-space:nowrap">Not Supplied &nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator" target="_blank" rel="noopener noreferrer">v2 Calculator</a></td>
        </tr>
        <tr>
          <td style="font-weight: bold;white-space:nowrap; width: 150px;">CVSS Temporal Score:</td>
          <td style="width: 250px;">3.4</td>
        </tr>
        <tr>
          <td style="font-weight: bold;white-space:nowrap">Common Weakness Enumeration (CWE):&nbsp;</td>
          <td style="width: 250px;">CWE-256</td>
        </tr>
        <tr>
          <td style="font-weight: bold;">Common Platform Enumeration (CPE):&nbsp;</td>
          <td style="width: 250px;">cpe:2.3:a:unisys:stealth:5.3:*:*:*:*:*:*:* </td>
        </tr>
        <tr>
          <td style="font-weight: bold;">Source:</td>
          <td>Internal Reported</td>
        </tr>
        <tr>
          <td style="font-weight: bold;">Keyword(s):</td>
          <td>WML</td>
        </tr>
        <tr>
          <td colspan="2" style="font-weight: bold;">Vulnerability Description:</td>
        </tr>
        <tr>
          <td colspan="2">Sensitive information (specifically clear text password information) is contained within the 5.3.062.0 version of the Enterprise ManagementInstaller_msi.log file. </td>
        </tr>
        <tr>
          <td colspan="2" style="font-weight: bold;">System Configuration:</td>
        </tr>
        <tr>
          <td colspan="2"></td>
        </tr>
        <tr>
          <td colspan="2" style="font-weight: bold;">Impact of Exploiting Vulnerability:</td>
        </tr>
        <tr>
          <td colspan="2"></td>
        </tr>
        <tr>
          <td colspan="2" style="font-weight: bold;">Remediation Description:</td>
        </tr>
        <tr>
          <td colspan="2">With deployment of the Stealth 5.3.062.4 software package, the EnterpriseManagerInstall_msi.log file no longer contains sensitive information.</td>
        </tr>
        <tr>
          <td colspan="2" style="font-weight: bold;">Workaround Information:</td>
        </tr>
        <tr>
          <td colspan="2">If you have already deployed the Stealth 5.3.062.0 software to your environment, Unisys recommends that you perform the following steps to increase the security of your environment prior to upgrading your environment to use
            of the Stealth 5.3.062.4 software: 1. From the Stealth Management Server, navigate to the following directory: <stealth data="" directory="">\Stealth 2. Delete the Enterprise ManagementInstaller_msi.log file. Performing this step removes
              all traces of sensitive information (specifically clear text password information) that is contained within the 5.3.062.0 version of the Enterprise ManagementInstaller_msi.log file. With deployment of the Stealth 5.3.062.4 software
              package, the EnterpriseManagerInstall_msi.log file no longer contains sensitive information. </stealth>
          </td>
        </tr>
        <tr>
          <td colspan="2" style="font-weight: bold;">References:</td>
        </tr>
        <tr>
          <td colspan="2">Announcement: Availability of the Unisys Stealth(core) 5.3 Release CTB (Client Technical Bulletin) 11722</td>
        </tr>
        <tr>
          <td colspan="2" style="font-weight: bold;">Additional Vendor Comment:</td>
        </tr>
        <tr>
          <td colspan="2"></td>
        </tr>
      </tbody>
    </table>
    <table>
      <tbody>
        <tr>
          <td style="width: 138px">&nbsp;</td>
        </tr>
      </tbody>
    </table>
    <table class="data">
      <tbody>
        <tr>
          <td>&nbsp;</td>
        </tr>
        <tr>
          <td colspan="2" style="text-align:center"></td>
        </tr>
        <tr>
          <td>&nbsp;</td>
        </tr>
        <tr>
          <td colspan="2">
            <p class="MsoNormal" style="font-weight: normal">
              <font color="red">
                <span style="font-weight: normal"><em>Disclaimer: </em></span>
              </font>
            </p>
            <font color="red">
            </font>
            <p class="MsoNormal" style="font-weight: normal">
              <font color="red">
                <em>Unisys Corporation provides the information in this Security Vulnerability Report “AS IS.” No warranties of any nature are extended by or for the information. Unisys disclaims any financial or other responsibility that may result
                  from your use of the information, including direct, indirect, special, or consequential damages.</em>
              </font>
            </p>
          </td>
        </tr>
      </tbody>
    </table>
    <br>
  </div>
</form>

Text Content

 * Public View: Login

 * Contact Us
 * Unisys.com
 * Support Portal

Product Support
Support Home > Product Vulnerability


VULNERABILITY REPORT - SENSITIVE INFORMATION IN STEALTH MANAGEMENT LOG

  Unisys ID: UIS-2024-1 Status: Published CVE-ID: CVE-2024-23758 Affected
Product: Stealth Affected Version: 5.3.062.0 Impact: LOW CVSS v3.1 Base Score:
3.9 CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N  v3
Calculator CVSS v2.0 Base Score: 0.0 CVSS v2.0 Vector: Not Supplied  v2
Calculator CVSS Temporal Score: 3.4 Common Weakness Enumeration (CWE):  CWE-256
Common Platform Enumeration (CPE):  cpe:2.3:a:unisys:stealth:5.3:*:*:*:*:*:*:*
Source: Internal Reported Keyword(s): WML Vulnerability Description: Sensitive
information (specifically clear text password information) is contained within
the 5.3.062.0 version of the Enterprise ManagementInstaller_msi.log file. System
Configuration: Impact of Exploiting Vulnerability: Remediation Description: With
deployment of the Stealth 5.3.062.4 software package, the
EnterpriseManagerInstall_msi.log file no longer contains sensitive information.
Workaround Information: If you have already deployed the Stealth 5.3.062.0
software to your environment, Unisys recommends that you perform the following
steps to increase the security of your environment prior to upgrading your
environment to use of the Stealth 5.3.062.4 software: 1. From the Stealth
Management Server, navigate to the following directory: \Stealth 2. Delete the
Enterprise ManagementInstaller_msi.log file. Performing this step removes all
traces of sensitive information (specifically clear text password information)
that is contained within the 5.3.062.0 version of the Enterprise
ManagementInstaller_msi.log file. With deployment of the Stealth 5.3.062.4
software package, the EnterpriseManagerInstall_msi.log file no longer contains
sensitive information. References: Announcement: Availability of the Unisys
Stealth(core) 5.3 Release CTB (Client Technical Bulletin) 11722 Additional
Vendor Comment:

 

   

Disclaimer:

Unisys Corporation provides the information in this Security Vulnerability
Report “AS IS.” No warranties of any nature are extended by or for the
information. Unisys disclaims any financial or other responsibility that may
result from your use of the information, including direct, indirect, special, or
consequential damages.


Paper copies are not controlled and may be out of date; reference the Product
Support Web site for current data.

                        Terms of Use      Privacy Notice © Unisys 2024     

We use cookies on this site. By using this site, you agree To our use Of
cookies. To change Or learn more, see our Privacy Notice.