CVE-2023-4501

User authentication with username and password credentials is ineffective in OpenText (Micro Focus) Visual COBOL, COBOL Server, Enterprise Developer, and Enterprise Server (including product variants such as Enterprise Test Server), versions 7.0 patch updates 19 and 20, 8.0 patch updates 8 and 9, and 9.0 patch update 1, when LDAP-based authentication is used with certain configurations. When the vulnerability is active, authentication succeeds with any valid username, regardless of whether the password is correct; it may also succeed with an invalid username (and any password). This allows an attacker with access to the product to impersonate any user.

Mitigations: The issue is corrected in the upcoming patch update for each affected product. Product overlays and workaround instructions are available through OpenText Support. The vulnerable configurations are believed to be uncommon.

Administrators can test for the vulnerability in their installations by attempting to sign on to a Visual COBOL or Enterprise Server component such as ESCWA using a valid username and incorrect password.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
OpenTextCNA
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 39%
VendorProductVersion
microfocuscobol_server
7.0:patch_update_19
microfocuscobol_server
7.0:patch_update_20
microfocuscobol_server
8.0:patch_update_8
microfocuscobol_server
8.0:patch_update_9
microfocuscobol_server
9.0:patch_update_1
microfocusenterprise_developer
7.0:patch_update_19
microfocusenterprise_developer
7.0:patch_update_20
microfocusenterprise_developer
8.0:patch_update_8
microfocusenterprise_developer
8.0:patch_update_9
microfocusenterprise_developer
9.0:patch_update_1
microfocusenterprise_server
7.0:patch_update_19
microfocusenterprise_server
7.0:patch_update_20
microfocusenterprise_server
8.0:patch_update_8
microfocusenterprise_server
8.0:patch_update_9
microfocusenterprise_server
9.0:patch_update_1
microfocusenterprise_test_server
7.0:patch_update_19
microfocusenterprise_test_server
7.0:patch_update_20
microfocusenterprise_test_server
8.0:patch_update_8
microfocusenterprise_test_server
8.0:patch_update_9
microfocusenterprise_test_server
9.0:patch_update_1
microfocusvisual_cobol
7.0:patch_update_19
microfocusvisual_cobol
7.0:patch_update_20
microfocusvisual_cobol
8.0:patch_update_8
microfocusvisual_cobol
8.0:patch_update_9
microfocusvisual_cobol
9.0:patch_update_1
𝑥
= Vulnerable software versions