
Cloud Vulnerability DB
A community-led vulnerabilities database
An algorithm-downgrade issue was discovered in Ylianst MeshCentral 1.1.16, a complete web-based remote monitoring and management web site. The vulnerability was disclosed in January 2024 and affects the MeshCentral server component (GitHub Repository, CVE Details).
The vulnerability exists in the mpsserver.js file where insecure TLS versions (SSLv3, TLSv1.0, and TLSv1.1) are allowed during connection negotiation. These TLS versions have known security vulnerabilities and weaknesses. The issue has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (CVE Details).
The vulnerability could expose applications to potential security risks by allowing connections using deprecated and insecure TLS protocol versions. This may lead to information disclosure as these older protocols have known weaknesses that could be exploited by attackers (Cryptographic Misuses).
Users should upgrade to a newer version of MeshCentral that addresses this vulnerability. Additionally, it is recommended to configure TLS settings to only allow secure protocol versions (TLS 1.2 and above) and disable support for older, vulnerable TLS versions (GitHub Repository).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."