encryption, causing database credentials to be sent in plaintext and
enabling unauthorized database access.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Anviz did not respond to CISA's attempts to coordinate these vulnerabilities. Users should contact Anviz for more information at https://www.anviz.com/contact-us.html.
Fri, 17 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 PreLogin to disable encryption, causing database credentials to be sent in plaintext and enabling unauthorized database access. | |
| Title | Anviz CrossChex Standard Algorithm Downgrade | |
| Weaknesses | CWE-757 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-04-17T20:26:17.922Z
Reserved: 2026-04-14T15:42:14.116Z
Link: CVE-2026-32650
Updated: 2026-04-17T20:26:11.187Z
Status : Received
Published: 2026-04-17T20:16:34.360
Modified: 2026-04-17T20:16:34.360
Link: CVE-2026-32650
No data.
OpenCVE Enrichment
No data.