logo

310 Unauthorized access to screen


Description

An advisor, through the GLIA application, should not have access to client information. However, the advisor can obtain different client data (without the client being aware of it), simply by logging into the user window and following the flow that the user goes through when opening an account.


Impact

Obtain confidential information from users without their approval.


Recommendation

User information should not be exposed to a third party in any part of the account opening flow.


Threat

Attacker from the Internet with access to GLIA application.


Expected Remediation Time

120 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: N
  • Attack complexity: L
  • Attack Requirements: N
  • Privileges required: L
  • User interaction: A
  • Confidentiality (VC): L
  • Integrity (VI): N
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: X

Requirements


Fixes


Last updated

2024/02/19