encryption, causing database credentials to be sent in plaintext and
enabling unauthorized database access.
Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Anviz did not respond to CISA's attempts to coordinate these vulnerabilities. Users should contact Anviz for more information at https://www.anviz.com/contact-us.html.
Mon, 04 May 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anviz crosschex Standard
|
|
| CPEs | cpe:2.3:a:anviz:crosschex_standard:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Anviz crosschex Standard
|
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anviz
Anviz anviz Crosschex Standard |
|
| Vendors & Products |
Anviz
Anviz anviz Crosschex Standard |
Fri, 17 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 PreLogin to disable encryption, causing database credentials to be sent in plaintext and enabling unauthorized database access. | |
| Title | Anviz CrossChex Standard Algorithm Downgrade | |
| Weaknesses | CWE-757 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-04-17T20:26:17.922Z
Reserved: 2026-04-14T15:42:14.116Z
Link: CVE-2026-32650
Updated: 2026-04-17T20:26:11.187Z
Status : Analyzed
Published: 2026-04-17T20:16:34.360
Modified: 2026-05-04T14:38:05.160
Link: CVE-2026-32650
No data.
OpenCVE Enrichment
Updated: 2026-04-20T14:59:40Z