CVE-2026-44925
Cross-Site Request Forgery in InfoScale VIOM
Publication date: 2026-05-20
Last updated on: 2026-05-20
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| veritas | infoscape | 9.1.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) issue in InfoScale version 9.1.3 Operations Manager (VIOM). It allows an attacker to trick a user who has an active session into clicking a malicious HTML link. This action causes the VIOM web application to perform unintended modifications without the user's knowledge.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The provided information does not include specific detection methods or commands to identify the Cross-Site Request Forgery (CSRF) vulnerability in InfoScale v.9.1.3 Operations Manager (VIOM).
How can this vulnerability impact me? :
The impact of this vulnerability is that an attacker can cause unauthorized changes within the VIOM web application by exploiting a user's active session. This can lead to unintended modifications being made without the user's consent or awareness, potentially compromising the integrity of the system managed by VIOM.
What immediate steps should I take to mitigate this vulnerability?
The provided resources do not specify immediate mitigation steps for the CSRF vulnerability in InfoScale v.9.1.3 Operations Manager (VIOM). However, general best practices for mitigating CSRF vulnerabilities include applying available patches or hot fixes, enforcing user authentication mechanisms such as two-factor authentication, and reviewing user access controls.
Resource 1 mentions deploying hot fixes and patches and configuring two-factor authentication, which may help mitigate security issues in InfoScale Operations Manager.