The Data Camouflage (aka FairCom Standard Encryption) algorithm in FairCom c-treeACE does not ensure that a decryption key is needed for accessing database contents, which allows context-dependent malicious users to read cleartext database records by copying a database to another system that has a certain default configuration.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
faircom c-treeace - |