VISAM Automation Base (VBASE) (Update B)
VISAM Automation Base (VBASE) Editor contains multiple critical vulnerabilities that allow an attacker to read unexpected files via path traversal, escalate privileges to system level, execute arbitrary code, bypass security mechanisms, and discover the cryptographic key used for web login authentication. Affected version: 11.5.0.2 and earlier. The vulnerabilities include CWE-23 (path traversal), CWE-276 (incorrect permission assignment), CWE-326 (weak cryptography), CWE-922 (insecure direct object reference), and CWE-121 (stack-based buffer overflow).
- Network access to the VBASE Editor application (typically port 80/443)
- VBASE Editor version 11.5.0.2 or earlier running on Windows workstation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4ca303bb-af87-4193-bd4b-048e06bf5616Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.