Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 PreLogin to disable
encryption, causing database credentials to be sent in plaintext and
enabling unauthorized database access.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Anviz did not respond to CISA's attempts to coordinate these vulnerabilities. Users should contact Anviz for more information at https://www.anviz.com/contact-us.html.

History

Fri, 17 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 PreLogin to disable encryption, causing database credentials to be sent in plaintext and enabling unauthorized database access.
Title Anviz CrossChex Standard Algorithm Downgrade
Weaknesses CWE-757
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-04-17T20:26:17.922Z

Reserved: 2026-04-14T15:42:14.116Z

Link: CVE-2026-32650

cve-icon Vulnrichment

Updated: 2026-04-17T20:26:11.187Z

cve-icon NVD

Status : Received

Published: 2026-04-17T20:16:34.360

Modified: 2026-04-17T20:16:34.360

Link: CVE-2026-32650

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses