Attachmate Schwachstellen

Zeitverlauf

Typ

Produkt

Attachmate Reflection FTP Client6
Attachmate Reflection for Secure IT2
Attachmate Reflection X2

Massnahmen

Official Fix10
Temporary Fix0
Workaround0
Unavailable0
Not Defined0

Ausnutzbarkeit

High0
Functional0
Proof-of-Concept0
Unproven2
Not Defined8

Zugriffsart

Not Defined0
Physical0
Local2
Adjacent0
Network8

Authentisierung

Not Defined0
High0
Low0
None10

Benutzeraktivität

Not Defined0
Required0
None10

C3BM Index

CVSSv3 Base

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤82
≤96
≤102

CVSSv3 Temp

≤10
≤20
≤30
≤40
≤50
≤60
≤72
≤82
≤94
≤102

VulDB

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤82
≤96
≤102

NVD

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

CNA

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Hersteller

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Exploit 0-day

<1k0
<2k0
<5k10
<10k0
<25k0
<50k0
<100k0
≥100k0

Exploit heute

<1k10
<2k0
<5k0
<10k0
<25k0
<50k0
<100k0
≥100k0

Exploitmarktvolumen

🔴 CTI Aktivitäten

Affected Products (7): Reflection (1), Reflection FTP Client (4), Reflection X (1), Reflection for Secure IT (1), Reflection for the Web (1), Verastream Host Integrator (1), Verastream Process Designer (1)

Interested in the pricing of exploits?

See the underground prices here!