Vulnerability Note VU#117604
Panasonic Arbitrator Back-End Server (BES) uses unencrypted communication
Panasonic Arbitrator Back-End Server (BES) uses an unencrypted channel to transmit data.
CWE-319: Cleartext Transmission of Sensitive Information
Panasonic Arbitrator Back-End Server (BES) uses an unencrypted channel to transmit data between the client and server. It has been reported that Active Directory and other sensitive credentials are exposed as a result.
A malicious user on the network may be able to discover sensitive credentials to other systems.
Apply an Update
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Panasonic||Affected||18 Nov 2014||08 Jan 2015|
CVSS Metrics (Learn More)
Thanks to the reporter who wishes to remain anonymous.
This document was written by Chris King.
- CVE IDs: Unknown
- Date Public: 11 Dec 2014
- Date First Published: 13 Jan 2015
- Date Last Updated: 13 Jan 2015
- Document Revision: 17
If you have feedback, comments, or additional information about this vulnerability, please send us email.