Mindbreeze InSpire Vulnerabilities

This page lists known security vulnerabilities found in Mindbreeze InSpire. The article titles contain the Mindbreeze issue number and, in the case of third-party software, the official CVE number. Information about the affected components, severity level, current status and how to prevent the issue as well as hotfix information if applicable, can be found on the detail pages. You can also use the full text search to find specific vulnerabilities.

If you have found a possible security vulnerability, please contact Mindbreeze InSpire Support at support@mindbreeze.com providing detailed information about the problem found.

Vulnerabilities

ID: MINDBREEZE21044  Affected Components: None  Severity: 6.8 Moderate  Status: Final  First published: December 16, 2021  CVEs: CVE-2021-44228 
ID: MINDBREEZE19439  Affected Components: Mindbreeze InSpire G7, Mindbreeze InSpire SaaS  Severity: 7.5 High  Status: Final  First published: October 4, 2021  CVEs: CVE-2021-35515, CVE-2021-35516, CVE-2021-35517, CVE-2021-36090  Summary CVE-2021-35515:  When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop
ID: MINDBREEZE19391  Affected Components: Mindbreeze InSpire G7, Mindbreeze InSpire SaaS  Severity: 7.0 Important​​​​​​​​​​​​​​  Status: Final  First published: October 4, 2021  CVEs: CVE-2021-33909, CVE-2019-20934  Summary BZ - 1902788 - CVE-2019-20934 kernel: use-after-free in show_numa_stats function BZ - 1970273 - CVE-2021-33909 kernel: size_t-to-int conversion vulnerability in the filesystem layer Remediation Hotfix Information
ID: MINDBREEZE18807  Affected Components: Mindbreeze InSpire G7, Mindbreeze InSpire SaaS  Severity: 7.8 Important  Status: Final  First published: October 4, 2021  CVEs: CVE-2021-3347, CVE-2020-8648, CVE-2020-27170 
ID: MINDBREEZE18131  Affected Components: Mindbreeze InSpire G7, Mindbreeze InSpire SaaS  Severity: 5.4 Medium  Status: Final  First published: October 28, 2021  CVEs: CVE-2020-1725, CVE-2020-14302, CVE-2020-10770  Summary CVE-2020-1725: A flaw was found in keycloak before version 13.0.0. In some scenarios a user still has access to a resource after changing the role mappings in Keycloak and after expiration of the previous access token. (5.4 Medium) 
ID: MINDBREEZE17777  Affected Components: Mindbreeze InSpire G7, Mindbreeze InSpire SaaS  Severity: 5.5 Medium  Status: Final  First published: October 4, 2021  CVEs: CVE-2021-28657, CVE-2021-27906, CVE-2021-27807 
ID: MINDBREEZE17003  Affected Components: Mindbreeze InSpire G7, Mindbreeze InSpire SaaS  Severity: 4.1 Medium  Status: Final  First published: March 2, 2021  Summary Using the SharePoint Online connector with the Option "Enable Delta Crawl" active (enabled by default), changes to SharePoint user roles (Role Updates) are not processed correctly. This can lead to Document ACLs being out of date.
ID: MINDBREEZE16594  Affected Components: Mindbreeze InSpire G6, Mindbreeze InSpire G7, Mindbreeze InSpire SaaS  Severity: 5.9 Medium  Status: Final  First published: February 2, 2021  CVEs: CVE-2020-1971 Summary OpenSSL: EDIPARTYNAME NULL pointer de-reference could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Remediation Hotfix Information
ID: MINDBREEZE16269  Affected Components: Mindbreeze InSpire G6, Mindbreeze InSpire G7, Mindbreeze InSpire SaaS  Severity: 6.1 Medium  Status: Final  First published: February 2, 2021  CVEs: CVE-2015-9251, CVE-2019-11358, CVE-2020-11022, CVE-2020-11023 Summary Removing this legacy Libraries fixes the following CVEs:
ID: MINDBREEZE16267  Affected Components: Mindbreeze InSpire G6, Mindbreeze InSpire G7, Mindbreeze InSpire SaaS  Severity: 6.1 Medium  Status: Final  First published: February 2, 2021  CVEs: CVE-2018-14040, CVE-2018-1404, CVE-2018-14042, CVE-2019-8331, CVE-2020-11022, CVE-2020-11023, CVE-2015-9251, CVE-2019-11358, CVE-2012-6708 Summary Bootstrap and JQuery update contains fixes for te following CVEs: