Does a CVE affect MetaDefender Storage Security?

In today's rapidly evolving digital landscape, understanding the impact of security vulnerabilities is more crucial than ever. The Common Vulnerabilities and Exposures (CVE) list is an invaluable resource for identifying potential security risks associated with software products. This article provides a comprehensive overview of various CVEs, helping you determine whether MetaDefender Storage Security is affected. By staying informed about these vulnerabilities, you can take proactive measures to protect your systems and data from potential threats.

CVESummary
CVE-2024-27322MetaDefender Storage Security doesn't use R programming language within the product, we are not affected by CVE-2024-27322.
CVE-2024-4603This vulnerability affects the functions EVP_PKEY_param_check() and EVP_PKEY_public_check(). Since these are not used, MetaDefender Storage Security is not affected.
CVE-2024-0727Upon thorough review and analysis, it has been determined that all versions of the License SDK integrated with the MDSS product do not utilize any of the mentioned vulnerable functions. Hence, MetaDefender Storage Security is not affected by CVE-2024-0727.
CVE-2023-46589MetaDefender Storage Security does not use Apache so it's not being affect by CVE-2023-46589
CVE-2023-44487MetaDefender Storage Security is not impacted by CVE-2023-44487.
CVE-2024-41110We tested with versions of Docker up to Docker version 27.1.1, build 6312585 and can confirm that MetaDefender Storage Security is not impacted by CVE-2024-41110

If Further Assistance is required, please proceed to log a support case or chat with our support engineer.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard