Vulnerabilites related to devolutions - devolutions_server
Vulnerability from fkie_nvd
Published
2024-12-04 18:15
Modified
2025-03-28 16:22
Severity ?
Summary
Incorrect authorization in the permission component in Devolutions Server 2024.3.7.0 and earlier allows an authenticated user to view the password history of an entry without the view password permission.
References
▼ | URL | Tags | |
---|---|---|---|
security@devolutions.net | https://devolutions.net/security/advisories/DEVO-2024-0017 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "B7EA3081-29D8-42F0-9C0D-5936F60E3108", versionEndExcluding: "2024.3.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Incorrect authorization in the permission component in Devolutions Server 2024.3.7.0 and earlier allows an authenticated user to view the password history of an entry without the view password permission.", }, { lang: "es", value: "La autorización incorrecta en el componente de permiso en Devolutions Server 2024.3.7.0 y versiones anteriores permite que un usuario autenticado vea el historial de contraseñas de una entrada sin el permiso de ver contraseña.", }, ], id: "CVE-2024-12196", lastModified: "2025-03-28T16:22:14.803", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-12-04T18:15:13.173", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0017", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-863", }, ], source: "security@devolutions.net", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-04-09 19:15
Modified
2025-03-28 16:20
Severity ?
Summary
Improper permission handling in the vault offline cache feature in Devolutions Remote Desktop Manager 2024.1.20 and earlier on windows and Devolutions Server 2024.1.8 and earlier allows an attacker to access sensitive informations contained in the offline cache file by gaining access to a computer where the software is installed even though the offline mode is disabled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * | |
devolutions | remote_desktop_manager | * | |
devolutions | remote_desktop_manager | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "2C6B1BE5-9C13-4FB3-9FD9-5C07895EB64A", versionEndExcluding: "2024.1.9.0", vulnerable: true, }, { criteria: "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", matchCriteriaId: "A0A4A4C4-D82F-482A-BD3B-C81751B7B7AB", versionEndExcluding: "2024.1.21.0", vulnerable: true, }, { criteria: "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", matchCriteriaId: "7B36BC3F-784D-4AC7-9224-6CD59EC6AC6F", versionEndExcluding: "2024.1.21.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper permission handling in the vault offline cache feature in Devolutions Remote Desktop Manager 2024.1.20 and earlier on windows and Devolutions Server 2024.1.8 and earlier allows an attacker to access sensitive informations contained in the offline cache file by gaining access to a computer where the software is installed even though the offline mode is disabled.\n\n", }, { lang: "es", value: "El manejo inadecuado de permisos en la función de caché fuera de línea de vault en Devolutions Remote Desktop Manager 2024.1.20 y versiones anteriores en Windows y Devolutions Server 2024.1.8 y versiones anteriores permite a un atacante acceder a información confidencial contenida en el archivo de caché fuera de línea obteniendo acceso a una computadora donde el software está instalado aunque el modo sin conexión esté desactivado.", }, ], id: "CVE-2024-3545", lastModified: "2025-03-28T16:20:52.220", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, exploitabilityScore: 0.9, impactScore: 3.4, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-04-09T19:15:41.380", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0006", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0006", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-281", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2025-03-13 13:15
Modified
2025-03-28 16:23
Severity ?
Summary
Improper access control in web extension restriction feature in Devolutions Server 2024.3.4.0
and earlier allows an authenticated user to bypass the browser extension restriction feature.
References
▼ | URL | Tags | |
---|---|---|---|
security@devolutions.net | https://devolutions.net/security/advisories/DEVO-2025-0004/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "AD744D7E-26C3-41F0-9C75-439406648A6D", versionEndExcluding: "2024.3.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access control in web extension restriction feature in Devolutions Server 2024.3.4.0\n\n and earlier allows an authenticated user to bypass the browser extension restriction feature.", }, { lang: "es", value: "El control de acceso inadecuado en la función de restricción de extensión web en Devolutions Server 2024.3.13 y versiones anteriores permite que un usuario autenticado omita la función de restricción de extensión del navegador.", }, ], id: "CVE-2025-2280", lastModified: "2025-03-28T16:23:07.340", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2025-03-13T13:15:58.533", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2025-0004/", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-284", }, ], source: "security@devolutions.net", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-04-02 21:15
Modified
2025-02-25 18:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
Permission bypass when importing or synchronizing entries in User vault
in Devolutions Server 2022.3.13 and prior versions allows users with restricted rights to bypass entry permission via id collision.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "F3145584-045F-40D2-8EC7-1C4719C86036", versionEndExcluding: "2023.1.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "\nPermission bypass when importing or synchronizing entries in User vault\n\n in Devolutions Server 2022.3.13 and prior versions allows users with restricted rights to bypass entry permission via id collision.\n\n", }, ], id: "CVE-2023-1603", lastModified: "2025-02-25T18:15:26.387", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-04-02T21:15:08.427", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0008", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0008", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-06-25 13:15
Modified
2025-03-28 16:22
Severity ?
Summary
Authentication bypass in the 2FA feature in Devolutions Server 2024.1.14.0 and earlier allows an authenticated attacker to authenticate to another user without being asked for the 2FA via another browser tab.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "F5ED1D6E-CB0B-42BD-8580-A3C7F55F5499", versionEndExcluding: "2024.1.15.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Authentication bypass in the 2FA feature in Devolutions Server 2024.1.14.0 and earlier allows an authenticated attacker to authenticate to another user without being asked for the 2FA via another browser tab.", }, { lang: "es", value: "La omisión de autenticación en la función 2FA en Devolutions Server 2024.1.14.0 y versiones anteriores permite a un atacante autenticado autenticarse ante otro usuario sin que se le solicite la 2FA a través de otra pestaña del navegador.", }, ], id: "CVE-2024-4846", lastModified: "2025-03-28T16:22:26.443", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.4, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-06-25T13:15:50.120", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0009", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0009", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-290", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2023-05-02 14:15
Modified
2025-01-30 17:15
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Summary
Improper access control in Subscriptions Folder path filter in Devolutions Server 2023.1.1 and earlier allows attackers with administrator privileges to retrieve usage information on folders in user vaults via a specific folder name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "F3145584-045F-40D2-8EC7-1C4719C86036", versionEndExcluding: "2023.1.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access control in Subscriptions Folder path filter in Devolutions Server 2023.1.1 and earlier allows attackers with administrator privileges to retrieve usage information on folders in user vaults via a specific folder name.", }, ], id: "CVE-2023-2445", lastModified: "2025-01-30T17:15:16.080", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-05-02T14:15:09.207", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0013/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0013/", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-346", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-03-05 22:15
Modified
2025-03-28 16:21
Severity ?
Summary
Denial of service in PAM password rotation during the check-in process in Devolutions Server 2023.3.14.0 allows an authenticated user with specific PAM permissions to make PAM credentials unavailable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "960AC5BA-C623-415A-967E-E6E8E5F3A17C", versionEndIncluding: "2023.3.16.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Denial of service in PAM password rotation during the check-in process in Devolutions Server 2023.3.14.0 allows an authenticated user with specific PAM permissions to make PAM credentials unavailable.\n\n\n", }, { lang: "es", value: "La denegación de servicio en la rotación de contraseñas de PAM durante el proceso de registro en Devolutions Server 2023.3.14.0 permite que un usuario autenticado con permisos de PAM específicos haga que las credenciales de PAM no estén disponibles.", }, ], id: "CVE-2024-1901", lastModified: "2025-03-28T16:21:10.993", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-03-05T22:15:47.103", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-14 20:15
Modified
2024-11-21 05:59
Severity ?
Summary
An SQL Injection issue in Devolutions Server before 2021.1 and Devolutions Server LTS before 2020.3.18 allows an administrative user to execute arbitrary SQL commands via a username in api/security/userinfo/delete.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://devolutions.net/security/advisories/DEVO-2021-0004 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://devolutions.net/security/advisories/DEVO-2021-0004 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * | |
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:lts:*:*:*", matchCriteriaId: "20539E3B-1639-4E4A-8C72-541D0ACF5E38", versionEndExcluding: "2020.3.18", vulnerable: true, }, { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:-:*:*:*", matchCriteriaId: "AA99F2C8-3A8E-441F-8E37-5B1B91E09A03", versionEndExcluding: "2021.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An SQL Injection issue in Devolutions Server before 2021.1 and Devolutions Server LTS before 2020.3.18 allows an administrative user to execute arbitrary SQL commands via a username in api/security/userinfo/delete.", }, { lang: "es", value: "Un problema de inyección SQL en Devolutions Server versiones anteriores a 2021.1 y Devolutions Server LTS versiones anteriores a 2020.3.18, permite a un usuario administrativo ejecutar comandos SQL arbitrarios por medio de un nombre de usuario en api/security/userinfo/delete", }, ], id: "CVE-2021-28157", lastModified: "2024-11-21T05:59:12.440", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-14T20:15:11.410", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2021-0004", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2021-0004", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-12-04 18:15
Modified
2025-03-28 16:22
Severity ?
Summary
Incorrect authorization in permission validation component in Devolutions Server 2024.3.6.0 and earlier allows an authenticated user to access some reporting endpoints.
References
▼ | URL | Tags | |
---|---|---|---|
security@devolutions.net | https://devolutions.net/security/advisories/DEVO-2024-0017 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "4C28C033-192A-442A-858D-FCB64949E8F2", versionEndExcluding: "2024.3.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Incorrect authorization in permission validation component in Devolutions Server 2024.3.6.0 and earlier allows an authenticated user to access some reporting endpoints.", }, { lang: "es", value: "La autorización incorrecta en el componente de validación de permisos en Devolutions Server 2024.3.6.0 y versiones anteriores permite que un usuario autenticado acceda a algunos endpoints de informes.", }, ], id: "CVE-2024-12148", lastModified: "2025-03-28T16:22:20.900", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-12-04T18:15:12.003", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0017", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-863", }, ], source: "security@devolutions.net", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2025-03-05 19:15
Modified
2025-03-28 16:22
Severity ?
Summary
Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass the 'add in root' permission.
References
▼ | URL | Tags | |
---|---|---|---|
security@devolutions.net | https://devolutions.net/security/advisories/DEVO-2025-0003/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "29BEC91D-145B-4A8E-8279-15BFFB76DC51", versionEndExcluding: "2024.3.13.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass the 'add in root' permission.", }, { lang: "es", value: "La autorización incorrecta en las bóvedas PAM en Devolutions Server 2024.3.12 y versiones anteriores permite que un usuario autenticado omita el permiso \"agregar en la raíz\".", }, ], id: "CVE-2025-2003", lastModified: "2025-03-28T16:22:53.547", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4.2, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2025-03-05T19:15:39.630", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2025-0003/", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-863", }, ], source: "security@devolutions.net", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-04-09 19:15
Modified
2025-03-28 16:20
Severity ?
Summary
Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to forge the displayed group in the PAM JIT elevation checkout request via a specially crafted request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "D3589B6C-8479-4575-BB85-12A7F35AFDCC", versionEndExcluding: "2024.1.11.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to forge the displayed group in the PAM JIT elevation checkout request via a specially crafted request.\n\n", }, { lang: "es", value: "La validación de entrada incorrecta en la función de elevación PAM JIT en Devolutions Server 2024.1.6 y versiones anteriores permite que un atacante con acceso a la función de elevación PAM JIT falsifique el grupo mostrado en la solicitud de pago de elevación PAM JIT a través de una solicitud especialmente manipulada.", }, ], id: "CVE-2024-2918", lastModified: "2025-03-28T16:20:56.060", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1, impactScore: 2.5, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-04-09T19:15:38.370", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0006", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0006", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2025-02-11 14:15
Modified
2025-03-28 16:22
Severity ?
Summary
Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality.
References
▼ | URL | Tags | |
---|---|---|---|
security@devolutions.net | https://devolutions.net/security/advisories/DEVO-2025-0002/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "6113998D-2E6C-4B73-A7AD-713F546D495E", versionEndExcluding: "2024.3.11.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality.", }, { lang: "es", value: "El restablecimiento de contraseña incorrecto en el módulo PAM en Devolutions Server 2024.3.10.0 y versiones anteriores permite que un usuario autenticado reutilice la contraseña de usuario de Oracle después del check-in debido a una falla en la funcionalidad de restablecimiento de contraseña.", }, ], id: "CVE-2025-1231", lastModified: "2025-03-28T16:22:09.763", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.5, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2025-02-11T14:15:31.130", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2025-0002/", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "security@devolutions.net", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-640", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-07-06 19:15
Modified
2024-11-21 07:00
Severity ?
Summary
HTML injection vulnerability in secure messages of Devolutions Server before 2022.2 allows attackers to alter the rendering of the page or redirect a user to another site.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "C17F30C9-39E7-4CE1-9500-B5BB6DD552DB", versionEndExcluding: "2022.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "HTML injection vulnerability in secure messages of Devolutions Server before 2022.2 allows attackers to alter the rendering of the page or redirect a user to another site.", }, { lang: "es", value: "Una vulnerabilidad de inyección de HTML en los mensajes seguros de Devolutions Server versiones anteriores a 2022.2 permite a atacantes alterar la representación de la página o redirigir a un usuario a otro sitio", }, ], id: "CVE-2022-2316", lastModified: "2024-11-21T07:00:45.340", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-07-06T19:15:08.267", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2022-0006", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2022-0006", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-10-13 13:15
Modified
2024-11-21 08:41
Severity ?
Summary
Improper access control in PAM propagation scripts in Devolutions Server 2023.2.8.0 and ealier allows an attack with permission to manage PAM propagation scripts to retrieve passwords stored in it via a GET request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "15C3CED4-3D9D-4A6C-94CE-802DF9E2C576", versionEndIncluding: "2023.2.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access control in PAM propagation scripts in Devolutions Server 2023.2.8.0 and ealier allows an attack with permission to manage PAM propagation scripts to retrieve passwords stored in it via a GET request.\n\n\n", }, { lang: "es", value: "El control de acceso inadecuado en los scripts de propagación de PAM en Devolutions Server 2023.2.8.0 y anteriores permite un ataque con permiso para administrar los scripts de propagación de PAM para recuperar las contraseñas almacenadas en él mediante una solicitud GET.", }, ], id: "CVE-2023-5240", lastModified: "2024-11-21T08:41:21.410", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-10-13T13:15:12.693", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0017", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0017", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-284", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-05-17 16:15
Modified
2025-03-28 16:22
Severity ?
Summary
Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.11.0 and earlier allows an authenticated user with access to the PAM JIT elevation feature to manipulate the LDAP filter query via a specially crafted request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "E2815D8D-64A2-4765-B1D8-FD2B85F1388A", versionEndExcluding: "2024.1.12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.11.0 and earlier allows an authenticated user with access to the PAM JIT elevation feature to manipulate the LDAP filter query via a specially crafted request.", }, { lang: "es", value: " La validación de entrada incorrecta en la función de elevación PAM JIT en Devolutions Server 2024.1.11.0 y versiones anteriores permite que un usuario autenticado con acceso a la función de elevación PAM JIT manipule la consulta del filtro LDAP a través de una solicitud especialmente manipulada.", }, ], id: "CVE-2024-5072", lastModified: "2025-03-28T16:22:30.187", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-05-17T16:15:08.300", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0007", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0007", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2025-03-13 13:15
Modified
2025-03-28 16:22
Severity ?
Summary
Exposure of password in web-based SSH authentication component in Devolutions Server 2024.3.13 and earlier allows a user to unadvertently leak his SSH password due to missing password masking.
References
▼ | URL | Tags | |
---|---|---|---|
security@devolutions.net | https://devolutions.net/security/advisories/DEVO-2025-0004/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "E072F027-1277-44E1-B0C1-FD45FADC4F41", versionEndExcluding: "2025.1.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Exposure of password in web-based SSH authentication component in Devolutions Server 2024.3.13 and earlier allows a user to unadvertently leak his SSH password due to missing password masking.", }, { lang: "es", value: "La exposición de la contraseña en el componente de autenticación SSH basado en web en Devolutions Server 2024.3.13 y versiones anteriores permite que un usuario filtre inadvertidamente su contraseña SSH debido a la falta de enmascaramiento de contraseña.", }, ], id: "CVE-2025-2277", lastModified: "2025-03-28T16:22:58.023", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2025-03-13T13:15:58.320", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2025-0004/", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "security@devolutions.net", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-522", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-14 20:15
Modified
2024-11-21 05:59
Severity ?
Summary
An overly permissive CORS policy in Devolutions Server before 2021.1 and Devolutions Server LTS before 2020.3.18 allows a remote attacker to leak cross-origin data via a crafted HTML page.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://devolutions.net/security/advisories/DEVO-2021-0004 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://devolutions.net/security/advisories/DEVO-2021-0004 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * | |
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:lts:*:*:*", matchCriteriaId: "20539E3B-1639-4E4A-8C72-541D0ACF5E38", versionEndExcluding: "2020.3.18", vulnerable: true, }, { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:-:*:*:*", matchCriteriaId: "AA99F2C8-3A8E-441F-8E37-5B1B91E09A03", versionEndExcluding: "2021.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An overly permissive CORS policy in Devolutions Server before 2021.1 and Devolutions Server LTS before 2020.3.18 allows a remote attacker to leak cross-origin data via a crafted HTML page.", }, { lang: "es", value: "Una política CORS demasiado permisiva en Devolutions Server versiones anteriores a 2021.1 y Devolutions Server LTS versiones anteriores a 2020.3.18, permite a un atacante remoto filtrar datos de origen cruzado por medio de una página HTML diseñada", }, ], id: "CVE-2021-28048", lastModified: "2024-11-21T05:59:02.543", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-14T20:15:11.317", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2021-0004", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2021-0004", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-346", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-03-10 21:15
Modified
2024-11-21 07:38
Severity ?
Summary
Improper access control in the secure messages feature in Devolutions Server 2022.3.12 and below allows an authenticated attacker that possesses the message UUID to access the data it contains.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "37456569-4E43-4C88-A658-E2B0E3C7A241", versionEndExcluding: "2022.3.13", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access control in the secure messages feature in Devolutions Server 2022.3.12 and below allows an authenticated attacker that possesses the message UUID to access the data it contains.\n\n\n", }, ], id: "CVE-2023-1201", lastModified: "2024-11-21T07:38:39.553", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-03-10T21:15:14.627", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0005", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0005", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-04-21 22:15
Modified
2025-02-04 20:15
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Insufficient access control in support ticket feature in Devolutions Server 2023.1.5.0 and below allows an authenticated attacker to send support tickets and download diagnostic files via specific endpoints.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "0A3D4219-1D06-4464-963E-33D0E67D4B15", versionEndExcluding: "2023.1.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient access control in support ticket feature in Devolutions Server 2023.1.5.0 and below allows an authenticated attacker to send support tickets and download diagnostic files via specific endpoints.", }, ], id: "CVE-2023-2118", lastModified: "2025-02-04T20:15:46.810", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.5, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-04-21T22:15:07.307", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0010", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0010", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-03-05 22:15
Modified
2025-03-28 16:21
Severity ?
Summary
Improper session management in the identity provider authentication flow in Devolutions Server 2023.3.14.0 and earlier allows an authenticated user via an identity provider to stay authenticated after his user is disabled or deleted in the identity provider such as Okta or Microsoft O365.
The user will stay authenticated until the Devolutions Server token expiration.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "960AC5BA-C623-415A-967E-E6E8E5F3A17C", versionEndIncluding: "2023.3.16.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper session management in the identity provider authentication flow in Devolutions Server 2023.3.14.0 and earlier allows an authenticated user via an identity provider to stay authenticated after his user is disabled or deleted in the identity provider such as Okta or Microsoft O365. \n\nThe user will stay authenticated until the Devolutions Server token expiration.", }, { lang: "es", value: "La gestión inadecuada de la sesión en el flujo de autenticación del proveedor de identidad en Devolutions Server 2023.3.14.0 y versiones anteriores permite que un usuario autenticado a través de un proveedor de identidad permanezca autenticado después de que su usuario se deshabilite o elimine en el proveedor de identidad, como Okta o Microsoft O365. El usuario permanecerá autenticado hasta que caduque el token del servidor Devolutions.", }, ], id: "CVE-2024-1900", lastModified: "2025-03-28T16:21:15.220", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "LOW", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 3.4, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-03-05T22:15:47.060", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-613", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-01 18:15
Modified
2024-11-21 08:41
Severity ?
Summary
Improper access control in Report log filters feature in Devolutions Server 2023.2.10.0 and earlier allows attackers to retrieve logs from vaults or entries they are not allowed to access via the report request url query parameters.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "5B4A300E-DC8C-4243-B5BD-9C4244A208D3", versionEndExcluding: "2023.3.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access control in Report log filters feature in Devolutions Server 2023.2.10.0 and earlier allows attackers to retrieve logs from vaults or entries they are not allowed to access via the report request url query parameters.", }, { lang: "es", value: "El control de acceso inadecuado en la función de filtros de registro de informes en Devolutions Server 2023.2.10.0 y versiones anteriores permite a los atacantes recuperar registros de bóvedas o entradas a las que no pueden acceder a través de los parámetros de consulta de la URL de solicitud de informe.", }, ], id: "CVE-2023-5358", lastModified: "2024-11-21T08:41:36.373", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-01T18:15:09.883", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0019/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0019/", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-06-20 17:15
Modified
2024-12-09 19:15
Severity ?
2.7 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
2.7 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
2.7 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Summary
Improper deletion of resource in the user management feature in Devolutions Server 2023.1.8 and earlier allows an administrator to view users vaults of deleted users via database access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "E4B602CC-F082-469F-B465-C22326D04932", versionEndExcluding: "2023.2.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper deletion of resource in the user management feature in Devolutions Server 2023.1.8 and earlier allows an administrator to view users vaults of deleted users via database access.\n\n", }, ], id: "CVE-2023-2400", lastModified: "2024-12-09T19:15:11.070", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 2.7, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 2.7, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 1.4, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-06-20T17:15:09.573", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0014", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0014", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-459", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-459", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2023-03-01 08:15
Modified
2025-03-17 19:15
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper access controls on some API endpoints in Devolutions Server 2022.3.12
and earlier could allow a standard privileged user to perform privileged
actions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "6A1ABDAA-CAE5-4CE3-8DB4-245062DAF575", versionEndIncluding: "2022.3.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access controls on some API endpoints in Devolutions Server 2022.3.12 \nand earlier could allow a standard privileged user to perform privileged \nactions.\n\n\n", }, ], id: "CVE-2023-0951", lastModified: "2025-03-17T19:15:15.033", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-03-01T08:15:11.603", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0003", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0003", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-03-05 22:15
Modified
2025-03-28 16:21
Severity ?
Summary
Improper privilege management in Just-in-time (JIT) elevation module in Devolutions Server 2023.3.14.0 and earlier allows a user to continue using the elevated privilege even after the expiration under specific circumstances
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "A94A8DBC-41A8-42B9-8DC9-7FA298A076DF", versionEndExcluding: "2023.3.16.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper privilege management in Just-in-time (JIT) elevation module in Devolutions Server 2023.3.14.0 and earlier allows a user to continue using the elevated privilege even after the expiration under specific circumstances\n\n\n", }, { lang: "es", value: "La gestión inadecuada de privilegios en el módulo de elevación Justo a tiempo (JIT) en Devolutions Server 2023.3.14.0 y versiones anteriores permite que un usuario continúe usando el privilegio elevado incluso después de su vencimiento en circunstancias específicas.", }, ], id: "CVE-2024-1764", lastModified: "2025-03-28T16:21:19.423", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.6, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4.7, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-03-05T22:15:46.947", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-269", }, ], source: "security@devolutions.net", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-25 14:15
Modified
2025-03-14 16:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
Authorization bypass in the PAM access request approval mechanism in Devolutions Server 2024.2.10 and earlier allows authenticated users with permissions to approve their own requests, bypassing intended security restrictions, via the PAM access request approval mechanism.
References
▼ | URL | Tags | |
---|---|---|---|
security@devolutions.net | https://devolutions.net/security/advisories/DEVO-2024-0013 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "52B27A2F-9360-4F61-9857-59157AF84556", versionEndExcluding: "2024.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Authorization bypass in the PAM access request approval mechanism in Devolutions Server 2024.2.10 and earlier allows authenticated users with permissions to approve their own requests, bypassing intended security restrictions, via the PAM access request approval mechanism.", }, { lang: "es", value: "La omisión de autorización en el mecanismo de aprobación de solicitud de acceso PAM en Devolutions Server 2024.2.10 y versiones anteriores permite a los usuarios autenticados con permisos aprobar sus propias solicitudes, omitiendo las restricciones de seguridad previstas, a través del mecanismo de aprobación de solicitud de acceso PAM.", }, ], id: "CVE-2024-6512", lastModified: "2025-03-14T16:15:38.500", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-09-25T14:15:05.560", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0013", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-863", }, ], source: "security@devolutions.net", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-03-01 08:15
Modified
2025-03-12 14:15
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Insufficient input sanitization in the documentation feature of Devolutions Server 2022.3.12 and earlier allows an authenticated attacker to perform an SQL Injection, potentially resulting in unauthorized access to system resources.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "6A1ABDAA-CAE5-4CE3-8DB4-245062DAF575", versionEndIncluding: "2022.3.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input sanitization in the documentation feature of Devolutions Server 2022.3.12 and earlier allows an authenticated attacker to perform an SQL Injection, potentially resulting in unauthorized access to system resources.\n\n\n", }, ], id: "CVE-2023-0953", lastModified: "2025-03-12T14:15:14.153", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-03-01T08:15:11.713", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0003", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0003", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-03-05 22:15
Modified
2025-03-14 01:15
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
3.9 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
3.9 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Summary
Improper access control in the notification feature in Devolutions Server 2023.3.14.0 and earlier allows a low privileged user to change notifications settings configured by an administrator.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "0144432E-807A-489D-BD21-7EF4E5AF163F", versionEndExcluding: "2024.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access control in the notification feature in Devolutions Server 2023.3.14.0 and earlier allows a low privileged user to change notifications settings configured by an administrator.\n\n\n", }, { lang: "es", value: "El control de acceso inadecuado en la función de notificación en Devolutions Server 2023.3.14.0 y versiones anteriores permite que un usuario con pocos privilegios cambie la configuración de notificaciones configurada por un administrador.", }, ], id: "CVE-2024-1898", lastModified: "2025-03-14T01:15:38.407", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.9, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.3, impactScore: 2.5, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-03-05T22:15:47.020", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-284", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-03-26 16:15
Modified
2025-03-28 16:21
Severity ?
Summary
Improper access control in PAM vault permissions in Devolutions Server 2024.1.10.0 and earlier allows an authenticated user with access to the PAM to access unauthorized PAM entries via a specific set of permissions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "0E78FB63-33B2-499B-9BB1-DE3EE1767E01", versionEndExcluding: "2024.1.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access control in PAM vault permissions in Devolutions Server 2024.1.10.0 and earlier allows an authenticated user with access to the PAM to access unauthorized PAM entries via a specific set of permissions.\n\n", }, { lang: "es", value: "El control de acceso inadecuado en los permisos de la bóveda de PAM en Devolutions Server 2024.1.6 y versiones anteriores permite que un usuario autenticado con acceso al PAM acceda a entradas de PAM no autorizadas a través de un conjunto específico de permisos.", }, ], id: "CVE-2024-2921", lastModified: "2025-03-28T16:21:04.050", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-03-26T16:15:14.173", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0005", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0005", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-306", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-01 22:15
Modified
2024-11-21 05:52
Severity ?
Summary
An issue was discovered in Devolutions Server before 2020.3. There is a cross-site scripting (XSS) vulnerability in entries of type Document.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "00230514-E551-4FCE-9C86-93F2C29F1D0C", versionEndExcluding: "2020.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in Devolutions Server before 2020.3. There is a cross-site scripting (XSS) vulnerability in entries of type Document.", }, { lang: "es", value: "Se detectó un problema en Devolutions Server versiones anteriores a 2020.3. Se presenta una vulnerabilidad de tipo cross-site scripting en las entradas de tipo Documento.", }, ], id: "CVE-2021-23925", lastModified: "2024-11-21T05:52:03.420", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-01T22:15:12.483", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-07-07 12:15
Modified
2024-11-21 07:08
Severity ?
Summary
Incorrect permission management in Devolutions Server before 2022.2 allows a new user with a preexisting username to inherit the permissions of that previous user.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://devolutions.net | Vendor Advisory | |
cve@mitre.org | https://devolutions.net/security/advisories/DEVO-2022-0006 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://devolutions.net | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://devolutions.net/security/advisories/DEVO-2022-0006 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "BE3E2EBC-F613-4B61-93CE-4814D06ACEAE", versionEndExcluding: "2022.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Incorrect permission management in Devolutions Server before 2022.2 allows a new user with a preexisting username to inherit the permissions of that previous user.", }, { lang: "es", value: "Una administración incorrecta de permisos en Devolutions Server versiones anteriores a 2022.2, permite que un nuevo usuario con un nombre de usuario preexistente herede los permisos de ese usuario anterior", }, ], id: "CVE-2022-33996", lastModified: "2024-11-21T07:08:45.130", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-07-07T12:15:09.727", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://devolutions.net", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2022-0006", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2022-0006", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-276", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-01 22:15
Modified
2024-11-21 05:52
Severity ?
Summary
An issue was discovered in Devolutions Server before 2020.3. There is Broken Authentication with Windows domain users.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "00230514-E551-4FCE-9C86-93F2C29F1D0C", versionEndExcluding: "2020.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in Devolutions Server before 2020.3. There is Broken Authentication with Windows domain users.", }, { lang: "es", value: "Se detectó un problema en Devolutions Server versiones anteriores a 2020.3. Se presenta una autenticación rota con los usuarios del dominio de Windows.", }, ], id: "CVE-2021-23923", lastModified: "2024-11-21T05:52:03.117", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4.9, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-01T22:15:12.373", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-01 22:15
Modified
2024-11-21 05:52
Severity ?
Summary
An issue was discovered in Devolutions Server before 2020.3. There is an exposure of sensitive information in diagnostic files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "00230514-E551-4FCE-9C86-93F2C29F1D0C", versionEndExcluding: "2020.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in Devolutions Server before 2020.3. There is an exposure of sensitive information in diagnostic files.", }, { lang: "es", value: "Se detectó un problema en Devolutions Server versiones anteriores a 2020.3. Se presenta una exposición de información confidencial en archivos de diagnóstico.", }, ], id: "CVE-2021-23924", lastModified: "2024-11-21T05:52:03.273", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-01T22:15:12.420", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-532", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-01 22:15
Modified
2024-11-21 05:52
Severity ?
Summary
An issue was discovered in Devolutions Server before 2020.3. There is broken access control on Password List entry elements.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "00230514-E551-4FCE-9C86-93F2C29F1D0C", versionEndExcluding: "2020.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in Devolutions Server before 2020.3. There is broken access control on Password List entry elements.", }, { lang: "es", value: "Se detectó un problema en Devolutions Server versiones anteriores a 2020.3. Se presenta un control de acceso roto en los elementos de entrada de la Lista de Contraseñas.", }, ], id: "CVE-2021-23921", lastModified: "2024-11-21T05:52:02.833", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-01T22:15:12.247", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-02-12 04:15
Modified
2025-03-25 21:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Improper access control in Devolutions Server allows an authenticated user to access unauthorized sensitive data.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "57A6BE95-673A-4B6A-A4A6-935FED407A3F", versionEndIncluding: "2022.3.9", versionStartIncluding: "2022.3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access control in Devolutions Server allows an authenticated user to access unauthorized sensitive data.\n\n\n", }, ], id: "CVE-2023-0661", lastModified: "2025-03-25T21:15:40.793", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-02-12T04:15:19.233", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0002", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-284", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-03-26 16:15
Modified
2025-03-27 19:32
Severity ?
Summary
Improper access control in PAM JIT elevation in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to elevate themselves to unauthorized groups via a specially crafted request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "0E78FB63-33B2-499B-9BB1-DE3EE1767E01", versionEndExcluding: "2024.1.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access control in PAM JIT elevation in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to elevate themselves to unauthorized groups via a specially crafted request.\n\n", }, { lang: "es", value: "El control de acceso inadecuado en la elevación de PAM JIT en Devolutions Server 2024.1.6 y versiones anteriores permite que un atacante con acceso a la función de elevación de PAM JIT se eleve a grupos no autorizados mediante una solicitud especialmente manipulada.", }, ], id: "CVE-2024-2915", lastModified: "2025-03-27T19:32:07.640", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-03-26T16:15:14.117", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0005", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0005", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-863", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2023-03-01 08:15
Modified
2025-03-17 19:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Summary
Improper access controls on entries in Devolutions Server
2022.3.12 and earlier could allow an authenticated user to access
sensitive data without proper authorization.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "6A1ABDAA-CAE5-4CE3-8DB4-245062DAF575", versionEndIncluding: "2022.3.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access controls on entries in Devolutions Server \n2022.3.12 and earlier could allow an authenticated user to access \nsensitive data without proper authorization.", }, ], id: "CVE-2023-0952", lastModified: "2025-03-17T19:15:15.243", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-03-01T08:15:11.657", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0003", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0003", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2025-03-13 13:15
Modified
2025-03-28 16:23
Severity ?
Summary
Improper access control in temporary access requests and checkout requests endpoints in Devolutions Server 2024.3.13 and earlier allows an authenticated user to access information about these requests via a known request ID.
References
▼ | URL | Tags | |
---|---|---|---|
security@devolutions.net | https://devolutions.net/security/advisories/DEVO-2025-0004/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "E072F027-1277-44E1-B0C1-FD45FADC4F41", versionEndExcluding: "2025.1.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper access control in temporary access requests and checkout requests endpoints in Devolutions Server 2024.3.13 and earlier allows an authenticated user to access information about these requests via a known request ID.", }, { lang: "es", value: "El control de acceso inadecuado en las solicitudes de acceso temporal y en los endpoints de solicitudes de pago en Devolutions Server 2024.3.13 y versiones anteriores permite que un usuario autenticado acceda a información sobre estas solicitudes a través de un ID de solicitud conocido.", }, ], id: "CVE-2025-2278", lastModified: "2025-03-28T16:23:02.837", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2025-03-13T13:15:58.430", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2025-0004/", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-284", }, ], source: "security@devolutions.net", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-12-04 18:15
Modified
2025-03-28 16:22
Severity ?
Summary
Incorrect permission assignment in the user migration feature in Devolutions Server 2024.3.8.0 and earlier allows users to retain their old permission sets.
References
▼ | URL | Tags | |
---|---|---|---|
security@devolutions.net | https://devolutions.net/security/advisories/DEVO-2024-0017 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "DA97BDA3-41D4-4AE1-854B-BFF4D5FADF27", versionEndExcluding: "2024.3.9.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Incorrect permission assignment in the user migration feature in Devolutions Server 2024.3.8.0 and earlier allows users to retain their old permission sets.", }, { lang: "es", value: "La asignación de permisos incorrecta en la función de migración de usuarios en Devolutions Server 2024.3.8.0 y versiones anteriores permite que los usuarios conserven sus antiguos conjuntos de permisos.", }, ], id: "CVE-2024-12151", lastModified: "2025-03-28T16:22:18.057", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, exploitabilityScore: 1.6, impactScore: 3.4, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-12-04T18:15:12.850", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0017", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-732", }, ], source: "security@devolutions.net", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-732", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-10-16 14:15
Modified
2024-11-21 08:42
Severity ?
Summary
Improper access control in the permission inheritance in Devolutions Server 2022.3.13.0 and earlier allows an attacker that compromised a low privileged user to access entries via a specific combination of permissions in the entry and in its parent.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "AAC949A1-4D5B-43C5-AE4A-DDEA655B77E7", versionEndIncluding: "2022.3.13.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "\n\nImproper access control in the permission inheritance in Devolutions Server 2022.3.13.0 and earlier allows an attacker that compromised a low privileged user to access entries via a specific combination of permissions in the entry and in its parent.\n\n\n", }, { lang: "es", value: "El control de acceso inadecuado en la herencia de permisos en Devolutions Server 2022.3.13.0 y versiones anteriores permite que un atacante que comprometió a un usuario con pocos privilegios acceda a las entradas a través de una combinación específica de permisos en la entrada y en su nivel superior.", }, ], id: "CVE-2023-5575", lastModified: "2024-11-21T08:42:02.940", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-10-16T14:15:10.550", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0018", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0018", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-01 19:15
Modified
2024-11-21 07:20
Severity ?
Summary
Dashlane password and Keepass Server password in My Account Settings are not encrypted in the database in Devolutions Remote Desktop Manager 2022.2.26 and prior versions and Devolutions Server 2022.3.1 and prior versions which allows database users to read the data.
This issue affects :
Remote Desktop Manager 2022.2.26 and prior versions.
Devolutions Server 2022.3.1 and prior versions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * | |
devolutions | remote_desktop_manager | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "D00735D4-E5F0-419E-AB94-7066ECCB3BD0", versionEndExcluding: "2022.3.2", vulnerable: true, }, { criteria: "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "FEE5E4C6-72AE-4E2E-818A-1A7C6D77FCCE", versionEndExcluding: "2022.2.27", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Dashlane password and Keepass Server password in My Account Settings are not encrypted in the database in Devolutions Remote Desktop Manager 2022.2.26 and prior versions and Devolutions Server 2022.3.1 and prior versions which allows database users to read the data.\n\nThis issue affects : \nRemote Desktop Manager 2022.2.26 and prior versions.\n\nDevolutions Server 2022.3.1 and prior versions.\n\n\n", }, { lang: "es", value: "La contraseña de Dashlane y la contraseña del Keepass Server en My Account Settings no están cifradas en la base de datos en Devolutions Remote Desktop Manager 2022.2.26 y versiones anteriores y en Devolutions Server 2022.3.1 y versiones anteriores, lo que permite a los usuarios de la base de datos leer los datos. Este problema afecta a: Remote Desktop Manager 2022.2.26 y versiones anteriores. Devolutions Server 2022.3.1 y versiones anteriores.", }, ], id: "CVE-2022-3781", lastModified: "2024-11-21T07:20:13.637", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-01T19:15:11.150", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2022-0009", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2022-0009", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-311", }, ], source: "security@devolutions.net", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-522", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-22 19:15
Modified
2024-11-21 08:43
Severity ?
Summary
Information leak in Content-Security-Policy header in Devolutions Server 2023.3.7.0 allows an unauthenticated attacker to list the configured Devolutions Gateways endpoints.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "B3C86B9C-37F7-4C8C-BB2F-CE0C64DCE3B4", versionEndExcluding: "2023.3.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Information leak in Content-Security-Policy header in Devolutions Server 2023.3.7.0 allows an unauthenticated attacker to list the configured Devolutions Gateways endpoints.\n\n\n", }, { lang: "es", value: "La fuga de información en el encabezado Content-Security-Policy en Devolutions Server 2023.3.7.0 permite a un atacante no autenticado enumerar los endpoints de Devolutions Gateways configurados.", }, ], id: "CVE-2023-6264", lastModified: "2024-11-21T08:43:29.310", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-22T19:15:09.803", references: [ { source: "security@devolutions.net", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0020/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0020/", }, ], sourceIdentifier: "security@devolutions.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-07-12 14:15
Modified
2024-11-21 06:13
Severity ?
2.6 (Low) - CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
Devolutions Server before 2021.1.18, and LTS before 2020.3.20, allows attackers to intercept private keys via a man-in-the-middle attack against the connections/partial endpoint (which accepts cleartext).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
devolutions | devolutions_server | * | |
devolutions | devolutions_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:lts:*:*:*", matchCriteriaId: "B71366F2-5FBF-41D6-B66A-014FD9631DB3", versionEndExcluding: "2020.3.20", vulnerable: true, }, { criteria: "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", matchCriteriaId: "FC3A0F59-3D1C-45FE-85C6-23A6A48B4F81", versionEndExcluding: "2021.1.18", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Devolutions Server before 2021.1.18, and LTS before 2020.3.20, allows attackers to intercept private keys via a man-in-the-middle attack against the connections/partial endpoint (which accepts cleartext).", }, { lang: "es", value: "Devolutions Server versiones anteriores a 2021.1.18, y LTS versiones anteriores a 2020.3.20, permite a atacantes interceptar claves privadas por medio de un ataque man-in-the-middle contra el endpoint de conexiones/parcial (que acepta texto sin cifrar)", }, ], id: "CVE-2021-36382", lastModified: "2024-11-21T06:13:39.027", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 2.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 1.4, source: "cve@mitre.org", type: "Secondary", }, { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-07-12T14:15:08.400", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2021-0005", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://devolutions.net/security/advisories/DEVO-2021-0005", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-319", }, { lang: "en", value: "CWE-522", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2024-1900
Vulnerability from cvelistv5
Published
2024-03-05 21:34
Modified
2024-11-01 17:03
Severity ?
EPSS score ?
Summary
Improper session management in the identity provider authentication flow in Devolutions Server 2023.3.14.0 and earlier allows an authenticated user via an identity provider to stay authenticated after his user is disabled or deleted in the identity provider such as Okta or Microsoft O365.
The user will stay authenticated until the Devolutions Server token expiration.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "LOW", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, }, { other: { content: { id: "CVE-2024-1900", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-03-06T16:17:25.767386Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-01T17:03:37.256Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T18:56:22.272Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", modules: [ "Okta", "Office 365", ], product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2023.3.14.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper session management in the identity provider authentication flow in Devolutions Server 2023.3.14.0 and earlier allows an authenticated user via an identity provider to stay authenticated after his user is disabled or deleted in the identity provider such as Okta or Microsoft O365. <br><br>The user will stay authenticated until the Devolutions Server token expiration.", }, ], value: "Improper session management in the identity provider authentication flow in Devolutions Server 2023.3.14.0 and earlier allows an authenticated user via an identity provider to stay authenticated after his user is disabled or deleted in the identity provider such as Okta or Microsoft O365. \n\nThe user will stay authenticated until the Devolutions Server token expiration.", }, ], providerMetadata: { dateUpdated: "2024-03-05T21:34:13.992Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-1900", datePublished: "2024-03-05T21:34:13.992Z", dateReserved: "2024-02-26T18:24:37.128Z", dateUpdated: "2024-11-01T17:03:37.256Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-0951
Vulnerability from cvelistv5
Published
2023-02-22 13:46
Modified
2025-03-17 18:27
Severity ?
EPSS score ?
Summary
Improper access controls on some API endpoints in Devolutions Server 2022.3.12
and earlier could allow a standard privileged user to perform privileged
actions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Devolutions Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T05:32:46.143Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0003", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-0951", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-03-12T14:55:19.427571Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-17T18:27:58.139Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Devolutions Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2022.3.12", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper access controls on some API endpoints in Devolutions Server 2022.3.12 \nand earlier could allow a standard privileged user to perform privileged \nactions.<br></div>", }, ], value: "Improper access controls on some API endpoints in Devolutions Server 2022.3.12 \nand earlier could allow a standard privileged user to perform privileged \nactions.\n\n\n", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-03-01T05:45:13.020Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0003", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-0951", datePublished: "2023-02-22T13:46:30.884Z", dateReserved: "2023-02-22T13:11:44.596Z", dateUpdated: "2025-03-17T18:27:58.139Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-28157
Vulnerability from cvelistv5
Published
2021-04-14 19:40
Modified
2024-08-03 21:40
Severity ?
EPSS score ?
Summary
An SQL Injection issue in Devolutions Server before 2021.1 and Devolutions Server LTS before 2020.3.18 allows an administrative user to execute arbitrary SQL commands via a username in api/security/userinfo/delete.
References
▼ | URL | Tags |
---|---|---|
https://devolutions.net/security/advisories/DEVO-2021-0004 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T21:40:12.149Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2021-0004", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-03-30T00:00:00", descriptions: [ { lang: "en", value: "An SQL Injection issue in Devolutions Server before 2021.1 and Devolutions Server LTS before 2020.3.18 allows an administrative user to execute arbitrary SQL commands via a username in api/security/userinfo/delete.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-14T19:40:17", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://devolutions.net/security/advisories/DEVO-2021-0004", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-28157", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An SQL Injection issue in Devolutions Server before 2021.1 and Devolutions Server LTS before 2020.3.18 allows an administrative user to execute arbitrary SQL commands via a username in api/security/userinfo/delete.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://devolutions.net/security/advisories/DEVO-2021-0004", refsource: "CONFIRM", url: "https://devolutions.net/security/advisories/DEVO-2021-0004", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-28157", datePublished: "2021-04-14T19:40:17", dateReserved: "2021-03-12T00:00:00", dateUpdated: "2024-08-03T21:40:12.149Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-5072
Vulnerability from cvelistv5
Published
2024-05-17 15:18
Modified
2025-03-13 16:45
Severity ?
EPSS score ?
Summary
Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.11.0 and earlier allows an authenticated user with access to the PAM JIT elevation feature to manipulate the LDAP filter query via a specially crafted request.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2024-5072", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-05-23T20:21:41.660067Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-13T16:45:40.484Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T21:03:10.490Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0007", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", modules: [ "PAM JIT", ], product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.1.11.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.11.0 and earlier allows an authenticated user with access to the PAM JIT elevation feature to manipulate the LDAP filter query via a specially crafted request.<br><br>", }, ], value: "Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.11.0 and earlier allows an authenticated user with access to the PAM JIT elevation feature to manipulate the LDAP filter query via a specially crafted request.", }, ], providerMetadata: { dateUpdated: "2024-05-17T15:18:15.722Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0007", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-5072", datePublished: "2024-05-17T15:18:15.722Z", dateReserved: "2024-05-17T15:05:56.157Z", dateUpdated: "2025-03-13T16:45:40.484Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-3545
Vulnerability from cvelistv5
Published
2024-04-09 19:01
Modified
2024-11-04 16:46
Severity ?
EPSS score ?
Summary
Improper permission handling in the vault offline cache feature in Devolutions Remote Desktop Manager 2024.1.20 and earlier on windows and Devolutions Server 2024.1.8 and earlier allows an attacker to access sensitive informations contained in the offline cache file by gaining access to a computer where the software is installed even though the offline mode is disabled.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Devolutions | Server |
Version: 0 < |
||||||
|
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, }, { other: { content: { id: "CVE-2024-3545", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-04-10T19:14:58.719678Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-281", description: "CWE-281 Improper Preservation of Permissions", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-04T16:46:03.419Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T20:12:07.633Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0006", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.1.8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", platforms: [ "Windows", ], product: "Remote Desktop Manager", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.1.20.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper permission handling in the vault offline cache feature in Devolutions Remote Desktop Manager 2024.1.20 and earlier on windows and Devolutions Server 2024.1.8 and earlier allows an attacker to access sensitive informations contained in the offline cache file by gaining access to a computer where the software is installed even though the offline mode is disabled.<br></div><div><br></div>", }, ], value: "Improper permission handling in the vault offline cache feature in Devolutions Remote Desktop Manager 2024.1.20 and earlier on windows and Devolutions Server 2024.1.8 and earlier allows an attacker to access sensitive informations contained in the offline cache file by gaining access to a computer where the software is installed even though the offline mode is disabled.\n\n", }, ], providerMetadata: { dateUpdated: "2024-04-09T19:01:43.329Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0006", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-3545", datePublished: "2024-04-09T19:01:43.329Z", dateReserved: "2024-04-09T18:43:05.078Z", dateUpdated: "2024-11-04T16:46:03.419Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-6264
Vulnerability from cvelistv5
Published
2023-11-22 18:39
Modified
2024-08-02 08:28
Severity ?
EPSS score ?
Summary
Information leak in Content-Security-Policy header in Devolutions Server 2023.3.7.0 allows an unauthenticated attacker to list the configured Devolutions Gateways endpoints.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:28:20.199Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0020/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", modules: [ "Devolutions Gateway", "Content-Security-Policy", ], product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2023.3.7", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Information leak in Content-Security-Policy header in Devolutions Server 2023.3.7.0 allows an unauthenticated attacker to list the configured Devolutions Gateways endpoints.<br></div>", }, ], value: "Information leak in Content-Security-Policy header in Devolutions Server 2023.3.7.0 allows an unauthenticated attacker to list the configured Devolutions Gateways endpoints.\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-11-22T18:39:21.629Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0020/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-6264", datePublished: "2023-11-22T18:39:21.629Z", dateReserved: "2023-11-22T18:34:42.184Z", dateUpdated: "2024-08-02T08:28:20.199Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-2918
Vulnerability from cvelistv5
Published
2024-04-09 18:42
Modified
2024-11-06 23:17
Severity ?
EPSS score ?
Summary
Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to forge the displayed group in the PAM JIT elevation checkout request via a specially crafted request.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2024-2918", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-16T19:35:45.587777Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-06T23:17:32.514Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T19:25:42.225Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0006", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.1.10.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to forge the displayed group in the PAM JIT elevation checkout request via a specially crafted request.<br></div>", }, ], value: "Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to forge the displayed group in the PAM JIT elevation checkout request via a specially crafted request.\n\n", }, ], providerMetadata: { dateUpdated: "2024-04-09T18:42:44.643Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0006", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-2918", datePublished: "2024-04-09T18:42:44.643Z", dateReserved: "2024-03-26T14:34:43.108Z", dateUpdated: "2024-11-06T23:17:32.514Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-28048
Vulnerability from cvelistv5
Published
2021-04-14 19:37
Modified
2024-08-03 21:33
Severity ?
EPSS score ?
Summary
An overly permissive CORS policy in Devolutions Server before 2021.1 and Devolutions Server LTS before 2020.3.18 allows a remote attacker to leak cross-origin data via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://devolutions.net/security/advisories/DEVO-2021-0004 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T21:33:17.305Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2021-0004", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-03-30T00:00:00", descriptions: [ { lang: "en", value: "An overly permissive CORS policy in Devolutions Server before 2021.1 and Devolutions Server LTS before 2020.3.18 allows a remote attacker to leak cross-origin data via a crafted HTML page.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-14T19:37:02", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://devolutions.net/security/advisories/DEVO-2021-0004", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-28048", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An overly permissive CORS policy in Devolutions Server before 2021.1 and Devolutions Server LTS before 2020.3.18 allows a remote attacker to leak cross-origin data via a crafted HTML page.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://devolutions.net/security/advisories/DEVO-2021-0004", refsource: "CONFIRM", url: "https://devolutions.net/security/advisories/DEVO-2021-0004", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-28048", datePublished: "2021-04-14T19:37:02", dateReserved: "2021-03-05T00:00:00", dateUpdated: "2024-08-03T21:33:17.305Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-1901
Vulnerability from cvelistv5
Published
2024-03-05 21:33
Modified
2024-11-06 14:24
Severity ?
EPSS score ?
Summary
Denial of service in PAM password rotation during the check-in process in Devolutions Server 2023.3.14.0 allows an authenticated user with specific PAM permissions to make PAM credentials unavailable.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2024-1901", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-03-06T15:26:47.449147Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-06T14:24:05.805Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T18:56:22.226Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2023.3.14.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Denial of service in PAM password rotation during the check-in process in Devolutions Server 2023.3.14.0 allows an authenticated user with specific PAM permissions to make PAM credentials unavailable.<br></div>", }, ], value: "Denial of service in PAM password rotation during the check-in process in Devolutions Server 2023.3.14.0 allows an authenticated user with specific PAM permissions to make PAM credentials unavailable.\n\n\n", }, ], providerMetadata: { dateUpdated: "2024-03-05T21:33:18.547Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-1901", datePublished: "2024-03-05T21:33:18.547Z", dateReserved: "2024-02-26T18:32:09.807Z", dateUpdated: "2024-11-06T14:24:05.805Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-2445
Vulnerability from cvelistv5
Published
2023-05-02 13:11
Modified
2025-01-30 16:10
Severity ?
EPSS score ?
Summary
Improper access control in Subscriptions Folder path filter in Devolutions Server 2023.1.1 and earlier allows attackers with administrator privileges to retrieve usage information on folders in user vaults via a specific folder name.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Devolutions Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T06:26:08.910Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0013/", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2023-2445", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-30T16:10:12.465700Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-346", description: "CWE-346 Origin Validation Error", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-30T16:10:20.896Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", ], product: "Devolutions Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2023.1.1", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper access control in Subscriptions Folder path filter in Devolutions Server 2023.1.1 and earlier allows attackers with administrator privileges to retrieve usage information on folders in user vaults via a specific folder name.", }, ], value: "Improper access control in Subscriptions Folder path filter in Devolutions Server 2023.1.1 and earlier allows attackers with administrator privileges to retrieve usage information on folders in user vaults via a specific folder name.", }, ], providerMetadata: { dateUpdated: "2023-05-02T13:11:06.405Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0013/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-2445", datePublished: "2023-05-02T13:11:06.405Z", dateReserved: "2023-05-01T14:10:14.917Z", dateUpdated: "2025-01-30T16:10:20.896Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-1898
Vulnerability from cvelistv5
Published
2024-03-05 21:35
Modified
2025-03-14 00:30
Severity ?
EPSS score ?
Summary
Improper access control in the notification feature in Devolutions Server 2023.3.14.0 and earlier allows a low privileged user to change notifications settings configured by an administrator.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.9, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2024-1898", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-03-06T18:45:44.637233Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284 Improper Access Control", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-14T00:30:07.216Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T18:56:22.554Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2023.3.14.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper access control in the notification feature in Devolutions Server 2023.3.14.0 and earlier allows a low privileged user to change notifications settings configured by an administrator.<br></div>", }, ], value: "Improper access control in the notification feature in Devolutions Server 2023.3.14.0 and earlier allows a low privileged user to change notifications settings configured by an administrator.\n\n\n", }, ], providerMetadata: { dateUpdated: "2024-03-05T21:35:04.786Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-1898", datePublished: "2024-03-05T21:35:04.786Z", dateReserved: "2024-02-26T18:17:28.096Z", dateUpdated: "2025-03-14T00:30:07.216Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-1231
Vulnerability from cvelistv5
Published
2025-02-11 14:05
Modified
2025-02-11 14:56
Severity ?
EPSS score ?
Summary
Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2025-1231", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-02-11T14:55:36.446797Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-11T14:56:16.812Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", modules: [ "PAM", ], product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.3.10.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality.<br></div>", }, ], value: "Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-287", description: "CWE-287 Improper Authentication", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-11T14:05:38.399Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2025-0002/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2025-1231", datePublished: "2025-02-11T14:05:38.399Z", dateReserved: "2025-02-11T13:34:41.146Z", dateUpdated: "2025-02-11T14:56:16.812Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-23921
Vulnerability from cvelistv5
Published
2021-04-01 21:46
Modified
2024-08-03 19:14
Severity ?
EPSS score ?
Summary
An issue was discovered in Devolutions Server before 2020.3. There is broken access control on Password List entry elements.
References
▼ | URL | Tags |
---|---|---|
https://devolutions.net/security/advisories/devo-2021-0002 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T19:14:09.558Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-03-30T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in Devolutions Server before 2020.3. There is broken access control on Password List entry elements.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-01T21:46:21", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-23921", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in Devolutions Server before 2020.3. There is broken access control on Password List entry elements.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://devolutions.net/security/advisories/devo-2021-0002", refsource: "CONFIRM", url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-23921", datePublished: "2021-04-01T21:46:21", dateReserved: "2021-01-12T00:00:00", dateUpdated: "2024-08-03T19:14:09.558Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-3781
Vulnerability from cvelistv5
Published
2022-11-01 18:28
Modified
2024-08-03 01:20
Severity ?
EPSS score ?
Summary
Dashlane password and Keepass Server password in My Account Settings are not encrypted in the database in Devolutions Remote Desktop Manager 2022.2.26 and prior versions and Devolutions Server 2022.3.1 and prior versions which allows database users to read the data.
This issue affects :
Remote Desktop Manager 2022.2.26 and prior versions.
Devolutions Server 2022.3.1 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Devolutions | Remote Desktop Manager |
Version: 0 < |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T01:20:58.271Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2022-0009", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Remote Desktop Manager", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2022.2.26", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Devolutions Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2022.3.1", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Dashlane password and Keepass Server password in My Account Settings are not encrypted in the database in Devolutions Remote Desktop Manager 2022.2.26 and prior versions and Devolutions Server 2022.3.1 and prior versions which allows database users to read the data.<br><br>This issue affects : <br><div>Remote Desktop Manager 2022.2.26 and prior versions.</div><div>Devolutions Server 2022.3.1 and prior versions.<br></div>", }, ], value: "Dashlane password and Keepass Server password in My Account Settings are not encrypted in the database in Devolutions Remote Desktop Manager 2022.2.26 and prior versions and Devolutions Server 2022.3.1 and prior versions which allows database users to read the data.\n\nThis issue affects : \nRemote Desktop Manager 2022.2.26 and prior versions.\n\nDevolutions Server 2022.3.1 and prior versions.\n\n\n", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-311", description: "CWE-311 Missing Encryption of Sensitive Data", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-01T18:28:28.590Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2022-0009", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2022-3781", datePublished: "2022-11-01T18:28:28.590Z", dateReserved: "2022-10-31T19:43:01.182Z", dateUpdated: "2024-08-03T01:20:58.271Z", requesterUserId: "f8cc67d2-f063-4532-a07d-c228278dd519", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-2118
Vulnerability from cvelistv5
Published
2023-04-21 21:52
Modified
2025-02-04 19:54
Severity ?
EPSS score ?
Summary
Insufficient access control in support ticket feature in Devolutions Server 2023.1.5.0 and below allows an authenticated attacker to send support tickets and download diagnostic files via specific endpoints.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Devolutions Server |
Version: 0 < 2023.1.6.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T06:12:20.420Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0010", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2023-2118", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-02-04T19:54:52.194311Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-04T19:54:58.711Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", ], product: "Devolutions Server", vendor: "Devolutions", versions: [ { lessThan: "2023.1.6.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], credits: [ { lang: "en", type: "finder", user: "00000000-0000-4000-9000-000000000000", value: "Jico", }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Insufficient access control in support ticket feature in Devolutions Server 2023.1.5.0 and below allows an authenticated attacker to send support tickets and download diagnostic files via specific endpoints.", }, ], value: "Insufficient access control in support ticket feature in Devolutions Server 2023.1.5.0 and below allows an authenticated attacker to send support tickets and download diagnostic files via specific endpoints.", }, ], providerMetadata: { dateUpdated: "2023-06-12T19:48:35.982Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0010", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-2118", datePublished: "2023-04-21T21:52:14.163Z", dateReserved: "2023-04-17T12:42:59.155Z", dateUpdated: "2025-02-04T19:54:58.711Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-36382
Vulnerability from cvelistv5
Published
2021-07-12 13:04
Modified
2024-08-04 00:54
Severity ?
EPSS score ?
Summary
Devolutions Server before 2021.1.18, and LTS before 2020.3.20, allows attackers to intercept private keys via a man-in-the-middle attack against the connections/partial endpoint (which accepts cleartext).
References
▼ | URL | Tags |
---|---|---|
https://devolutions.net/security/advisories/DEVO-2021-0005 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T00:54:51.456Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2021-0005", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Devolutions Server before 2021.1.18, and LTS before 2020.3.20, allows attackers to intercept private keys via a man-in-the-middle attack against the connections/partial endpoint (which accepts cleartext).", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 2.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AC:H/AV:A/A:N/C:L/I:N/PR:N/S:U/UI:R", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-07-12T13:04:50", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://devolutions.net/security/advisories/DEVO-2021-0005", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-36382", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Devolutions Server before 2021.1.18, and LTS before 2020.3.20, allows attackers to intercept private keys via a man-in-the-middle attack against the connections/partial endpoint (which accepts cleartext).", }, ], }, impact: { cvss: { attackComplexity: "HIGH", attackVector: "ADJACENT", availabilityImpact: "NONE", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AC:H/AV:A/A:N/C:L/I:N/PR:N/S:U/UI:R", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://devolutions.net/security/advisories/DEVO-2021-0005", refsource: "MISC", url: "https://devolutions.net/security/advisories/DEVO-2021-0005", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-36382", datePublished: "2021-07-12T13:04:50", dateReserved: "2021-07-12T00:00:00", dateUpdated: "2024-08-04T00:54:51.456Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-12148
Vulnerability from cvelistv5
Published
2024-12-04 17:18
Modified
2024-12-05 18:45
Severity ?
EPSS score ?
Summary
Incorrect authorization in permission validation component in Devolutions Server 2024.3.6.0 and earlier allows an authenticated user to access some reporting endpoints.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2024-12148", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-05T18:44:36.256183Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-05T18:45:02.579Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.3.6.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Incorrect authorization in permission validation component in Devolutions Server 2024.3.6.0 and earlier allows an authenticated user to access some reporting endpoints.<br>", }, ], value: "Incorrect authorization in permission validation component in Devolutions Server 2024.3.6.0 and earlier allows an authenticated user to access some reporting endpoints.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "CWE-863: Incorrect Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-12-04T17:18:21.584Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0017", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-12148", datePublished: "2024-12-04T17:18:21.584Z", dateReserved: "2024-12-04T13:06:06.840Z", dateUpdated: "2024-12-05T18:45:02.579Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-2277
Vulnerability from cvelistv5
Published
2025-03-13 12:47
Modified
2025-03-18 16:30
Severity ?
EPSS score ?
Summary
Exposure of password in web-based SSH authentication component in Devolutions Server 2024.3.13 and earlier allows a user to unadvertently leak his SSH password due to missing password masking.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2025-2277", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-03-18T16:30:32.395831Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-18T16:30:53.932Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.3.13.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Exposure of password in web-based SSH authentication component in Devolutions Server 2024.3.13 and earlier allows a user to unadvertently leak his SSH password due to missing password masking.</div>", }, ], value: "Exposure of password in web-based SSH authentication component in Devolutions Server 2024.3.13 and earlier allows a user to unadvertently leak his SSH password due to missing password masking.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-13T12:47:02.631Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2025-0004/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2025-2277", datePublished: "2025-03-13T12:47:02.631Z", dateReserved: "2025-03-13T12:42:17.156Z", dateUpdated: "2025-03-18T16:30:53.932Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-5240
Vulnerability from cvelistv5
Published
2023-10-13 12:22
Modified
2024-09-17 20:28
Severity ?
EPSS score ?
Summary
Improper access control in PAM propagation scripts in Devolutions Server 2023.2.8.0 and ealier allows an attack with permission to manage PAM propagation scripts to retrieve passwords stored in it via a GET request.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T07:52:08.519Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0017", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-5240", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-17T20:27:56.901422Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284 Improper Access Control", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-17T20:28:22.828Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", modules: [ "PAM", ], product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2023.2.8.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper access control in PAM propagation scripts in Devolutions Server 2023.2.8.0 and ealier allows an attack with permission to manage PAM propagation scripts to retrieve passwords stored in it via a GET request.<br></div>", }, ], value: "Improper access control in PAM propagation scripts in Devolutions Server 2023.2.8.0 and ealier allows an attack with permission to manage PAM propagation scripts to retrieve passwords stored in it via a GET request.\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-10-13T12:22:23.816Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0017", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-5240", datePublished: "2023-10-13T12:22:23.816Z", dateReserved: "2023-09-27T18:43:43.331Z", dateUpdated: "2024-09-17T20:28:22.828Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-12151
Vulnerability from cvelistv5
Published
2024-12-04 17:17
Modified
2024-12-05 18:48
Severity ?
EPSS score ?
Summary
Incorrect permission assignment in the user migration feature in Devolutions Server 2024.3.8.0 and earlier allows users to retain their old permission sets.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, }, { other: { content: { id: "CVE-2024-12151", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-05T18:47:38.780076Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-05T18:48:20.286Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.3.8.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div> Incorrect permission assignment in the user migration feature in Devolutions Server 2024.3.8.0 and earlier allows users to retain their old permission sets.<br></div>", }, ], value: "Incorrect permission assignment in the user migration feature in Devolutions Server 2024.3.8.0 and earlier allows users to retain their old permission sets.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-732", description: "CWE-732: Incorrect Permission Assignment for Critical Resource", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-12-04T17:17:31.712Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0017", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-12151", datePublished: "2024-12-04T17:17:31.712Z", dateReserved: "2024-12-04T13:39:26.086Z", dateUpdated: "2024-12-05T18:48:20.286Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-0661
Vulnerability from cvelistv5
Published
2023-02-03 15:48
Modified
2025-03-25 20:45
Severity ?
EPSS score ?
Summary
Improper access control in Devolutions Server allows an authenticated user to access unauthorized sensitive data.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Devolutions Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T05:17:50.338Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0002", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2023-0661", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-03-25T20:45:27.279075Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284 Improper Access Control", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-25T20:45:31.167Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Devolutions Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2022.3.9", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper access control in Devolutions Server allows an authenticated user to access unauthorized sensitive data.<br></div>", }, ], value: "Improper access control in Devolutions Server allows an authenticated user to access unauthorized sensitive data.\n\n\n", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-12T01:45:42.615Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0002", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-0661", datePublished: "2023-02-03T15:48:17.672Z", dateReserved: "2023-02-03T15:24:08.811Z", dateUpdated: "2025-03-25T20:45:31.167Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-1603
Vulnerability from cvelistv5
Published
2023-03-23 17:13
Modified
2025-02-25 17:14
Severity ?
EPSS score ?
Summary
Permission bypass when importing or synchronizing entries in User vault
in Devolutions Server 2022.3.13 and prior versions allows users with restricted rights to bypass entry permission via id collision.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T05:57:23.248Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0008", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2023-1603", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-02-25T17:14:32.500593Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "CWE-863 Incorrect Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-25T17:14:37.879Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2022.3.13", status: "affected", version: "0", versionType: "custom", }, ], }, ], datePublic: "2023-03-23T17:13:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "\n\nPermission bypass when importing or synchronizing entries<span style=\"background-color: rgb(255, 255, 255);\"> in User vault</span>\n\n in Devolutions Server 2022.3.13 and <span style=\"background-color: rgb(255, 255, 255);\">prior versions </span>allows users with restricted rights to bypass entry permission via id collision.\n\n", }, ], value: "\nPermission bypass when importing or synchronizing entries in User vault\n\n in Devolutions Server 2022.3.13 and prior versions allows users with restricted rights to bypass entry permission via id collision.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-02T18:49:20.069Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0008", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-1603", datePublished: "2023-03-23T17:13:31.049Z", dateReserved: "2023-03-23T15:48:10.734Z", dateUpdated: "2025-02-25T17:14:37.879Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-5575
Vulnerability from cvelistv5
Published
2023-10-16 13:29
Modified
2024-09-16 18:08
Severity ?
EPSS score ?
Summary
Improper access control in the permission inheritance in Devolutions Server 2022.3.13.0 and earlier allows an attacker that compromised a low privileged user to access entries via a specific combination of permissions in the entry and in its parent.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:07:32.225Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0018", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-5575", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-16T18:07:48.231617Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-16T18:08:03.213Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", modules: [ "Permissions", ], product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: " 2022.3.13.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div><br></div><div>Improper access control in the permission inheritance in Devolutions Server 2022.3.13.0 and earlier allows an attacker that compromised a low privileged user to access entries via a specific combination of permissions in the entry and in its parent.<br></div>", }, ], value: "\n\nImproper access control in the permission inheritance in Devolutions Server 2022.3.13.0 and earlier allows an attacker that compromised a low privileged user to access entries via a specific combination of permissions in the entry and in its parent.\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-10-16T13:29:57.988Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0018", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-5575", datePublished: "2023-10-16T13:29:57.988Z", dateReserved: "2023-10-13T12:47:46.874Z", dateUpdated: "2024-09-16T18:08:03.213Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-2316
Vulnerability from cvelistv5
Published
2022-07-06 18:56
Modified
2024-08-03 00:32
Severity ?
EPSS score ?
Summary
HTML injection vulnerability in secure messages of Devolutions Server before 2022.2 allows attackers to alter the rendering of the page or redirect a user to another site.
References
▼ | URL | Tags |
---|---|---|
https://devolutions.net/security/advisories/DEVO-2022-0006 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Devolutions Server |
Version: 2022.2 < 2022.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T00:32:09.493Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2022-0006", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Devolutions Server", vendor: "Devolutions", versions: [ { lessThan: "2022.2", status: "affected", version: "2022.2", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "HTML injection vulnerability in secure messages of Devolutions Server before 2022.2 allows attackers to alter the rendering of the page or redirect a user to another site.", }, ], problemTypes: [ { descriptions: [ { description: "HTML injection", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-07-06T18:56:20", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://devolutions.net/security/advisories/DEVO-2022-0006", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@devolutions.net", ID: "CVE-2022-2316", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Devolutions Server", version: { version_data: [ { version_affected: "<", version_name: "2022.2", version_value: "2022.2", }, ], }, }, ], }, vendor_name: "Devolutions", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "HTML injection vulnerability in secure messages of Devolutions Server before 2022.2 allows attackers to alter the rendering of the page or redirect a user to another site.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "HTML injection", }, ], }, ], }, references: { reference_data: [ { name: "https://devolutions.net/security/advisories/DEVO-2022-0006", refsource: "MISC", url: "https://devolutions.net/security/advisories/DEVO-2022-0006", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2022-2316", datePublished: "2022-07-06T18:56:20", dateReserved: "2022-07-05T00:00:00", dateUpdated: "2024-08-03T00:32:09.493Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-2921
Vulnerability from cvelistv5
Published
2024-03-26 15:51
Modified
2024-11-07 15:30
Severity ?
EPSS score ?
Summary
Improper access control in PAM vault permissions in Devolutions Server 2024.1.10.0 and earlier allows an authenticated user with access to the PAM to access unauthorized PAM entries via a specific set of permissions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "devolutions_server", vendor: "devolutions", versions: [ { lessThanOrEqual: "2024.1.6", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-2921", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-07T15:30:04.417077Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-306", description: "CWE-306 Missing Authentication for Critical Function", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-07T15:30:21.748Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T19:25:42.199Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0005", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.1.6", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper access control in PAM vault permissions in Devolutions Server 2024.1.10.0 and earlier allows an authenticated user with access to the PAM to access unauthorized PAM entries via a specific set of permissions.<br></div>", }, ], value: "Improper access control in PAM vault permissions in Devolutions Server 2024.1.10.0 and earlier allows an authenticated user with access to the PAM to access unauthorized PAM entries via a specific set of permissions.\n\n", }, ], providerMetadata: { dateUpdated: "2024-04-09T19:07:19.500Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0005", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-2921", datePublished: "2024-03-26T15:51:24.128Z", dateReserved: "2024-03-26T15:04:26.012Z", dateUpdated: "2024-11-07T15:30:21.748Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-2003
Vulnerability from cvelistv5
Published
2025-03-05 18:56
Modified
2025-03-05 19:23
Severity ?
EPSS score ?
Summary
Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass the 'add in root' permission.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", version: "3.1", }, }, { other: { content: { id: "CVE-2025-2003", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-03-05T19:22:43.844344Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-05T19:23:25.474Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.3.12.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass the 'add in root' permission.</div>", }, ], value: "Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass the 'add in root' permission.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "CWE-863: Incorrect Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-05T18:56:20.360Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2025-0003/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2025-2003", datePublished: "2025-03-05T18:56:20.360Z", dateReserved: "2025-03-05T18:47:44.393Z", dateUpdated: "2025-03-05T19:23:25.474Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-23923
Vulnerability from cvelistv5
Published
2021-04-01 21:44
Modified
2024-08-03 19:14
Severity ?
EPSS score ?
Summary
An issue was discovered in Devolutions Server before 2020.3. There is Broken Authentication with Windows domain users.
References
▼ | URL | Tags |
---|---|---|
https://devolutions.net/security/advisories/devo-2021-0002 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T19:14:09.493Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-03-30T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in Devolutions Server before 2020.3. There is Broken Authentication with Windows domain users.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-01T21:44:52", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-23923", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in Devolutions Server before 2020.3. There is Broken Authentication with Windows domain users.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://devolutions.net/security/advisories/devo-2021-0002", refsource: "CONFIRM", url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-23923", datePublished: "2021-04-01T21:44:52", dateReserved: "2021-01-12T00:00:00", dateUpdated: "2024-08-03T19:14:09.493Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-2400
Vulnerability from cvelistv5
Published
2023-06-20 16:19
Modified
2024-12-09 18:29
Severity ?
EPSS score ?
Summary
Improper deletion of resource in the user management feature in Devolutions Server 2023.1.8 and earlier allows an administrator to view users vaults of deleted users via database access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T06:19:15.014Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0014", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 2.7, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2023-2400", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-09T18:28:46.885401Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-459", description: "CWE-459 Incomplete Cleanup", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-12-09T18:29:48.495Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", modules: [ "User Management", ], product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2023.1.8", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper deletion of resource in the user management feature in Devolutions Server 2023.1.8 and earlier allows an administrator to view users vaults of deleted users via database access.<br><br>", }, ], value: "Improper deletion of resource in the user management feature in Devolutions Server 2023.1.8 and earlier allows an administrator to view users vaults of deleted users via database access.\n\n", }, ], providerMetadata: { dateUpdated: "2023-06-20T16:19:50.629Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0014", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-2400", datePublished: "2023-06-20T16:19:50.629Z", dateReserved: "2023-04-28T13:17:13.624Z", dateUpdated: "2024-12-09T18:29:48.495Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-12196
Vulnerability from cvelistv5
Published
2024-12-04 17:17
Modified
2024-12-04 21:13
Severity ?
EPSS score ?
Summary
Incorrect authorization in the permission component in Devolutions Server 2024.3.7.0 and earlier allows an authenticated user to view the password history of an entry without the view password permission.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2024-12196", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-04T21:11:17.806644Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-04T21:13:37.434Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.3.7.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Incorrect authorization in the permission component in Devolutions Server 2024.3.7.0 and earlier allows an authenticated user to view the password history of an entry without the view password permission.<br></div>", }, ], value: "Incorrect authorization in the permission component in Devolutions Server 2024.3.7.0 and earlier allows an authenticated user to view the password history of an entry without the view password permission.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "CWE-863: Incorrect Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-12-04T17:17:06.238Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0017", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-12196", datePublished: "2024-12-04T17:17:06.238Z", dateReserved: "2024-12-04T17:04:24.856Z", dateUpdated: "2024-12-04T21:13:37.434Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-2915
Vulnerability from cvelistv5
Published
2024-03-26 15:51
Modified
2024-10-28 18:32
Severity ?
EPSS score ?
Summary
Improper access control in PAM JIT elevation in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to elevate themselves to unauthorized groups via a specially crafted request.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-01T19:25:42.150Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0005", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "devolutions_server", vendor: "devolutions", versions: [ { lessThanOrEqual: "202.1.6", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-2915", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-08-06T15:09:06.918020Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "CWE-863 Incorrect Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-28T18:32:24.481Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.1.6", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper access control in PAM JIT elevation in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to elevate themselves to unauthorized groups via a specially crafted request.<br></div>", }, ], value: "Improper access control in PAM JIT elevation in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to elevate themselves to unauthorized groups via a specially crafted request.\n\n", }, ], providerMetadata: { dateUpdated: "2024-03-26T15:51:02.451Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0005", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-2915", datePublished: "2024-03-26T15:51:02.451Z", dateReserved: "2024-03-26T14:09:08.146Z", dateUpdated: "2024-10-28T18:32:24.481Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-4846
Vulnerability from cvelistv5
Published
2024-06-25 12:18
Modified
2024-11-20 21:35
Severity ?
EPSS score ?
Summary
Authentication bypass in the 2FA feature in Devolutions Server 2024.1.14.0 and earlier allows an authenticated attacker to authenticate to another user without being asked for the 2FA via another browser tab.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, }, { other: { content: { id: "CVE-2024-4846", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-06-25T14:05:08.351571Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-290", description: "CWE-290 Authentication Bypass by Spoofing", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-20T21:35:56.186Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T20:55:09.986Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0009", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.1.14.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div> Authentication bypass in the 2FA feature in Devolutions Server 2024.1.14.0 and earlier allows an authenticated attacker to authenticate to another user without being asked for the 2FA via another browser tab.<br></div>", }, ], value: "Authentication bypass in the 2FA feature in Devolutions Server 2024.1.14.0 and earlier allows an authenticated attacker to authenticate to another user without being asked for the 2FA via another browser tab.", }, ], providerMetadata: { dateUpdated: "2024-06-25T12:18:18.180Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0009", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-4846", datePublished: "2024-06-25T12:18:18.180Z", dateReserved: "2024-05-13T17:35:34.290Z", dateUpdated: "2024-11-20T21:35:56.186Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-23925
Vulnerability from cvelistv5
Published
2021-04-01 21:50
Modified
2024-08-03 19:14
Severity ?
EPSS score ?
Summary
An issue was discovered in Devolutions Server before 2020.3. There is a cross-site scripting (XSS) vulnerability in entries of type Document.
References
▼ | URL | Tags |
---|---|---|
https://devolutions.net/security/advisories/devo-2021-0002 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T19:14:09.579Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-03-30T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in Devolutions Server before 2020.3. There is a cross-site scripting (XSS) vulnerability in entries of type Document.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-01T21:50:10", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-23925", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in Devolutions Server before 2020.3. There is a cross-site scripting (XSS) vulnerability in entries of type Document.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://devolutions.net/security/advisories/devo-2021-0002", refsource: "CONFIRM", url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-23925", datePublished: "2021-04-01T21:50:10", dateReserved: "2021-01-12T00:00:00", dateUpdated: "2024-08-03T19:14:09.579Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-1201
Vulnerability from cvelistv5
Published
2023-03-06 17:15
Modified
2025-03-06 14:53
Severity ?
EPSS score ?
Summary
Improper access control in the secure messages feature in Devolutions Server 2022.3.12 and below allows an authenticated attacker that possesses the message UUID to access the data it contains.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Devolutions Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T05:40:59.782Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0005", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-1201", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-03-06T14:53:36.636004Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-06T14:53:59.575Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Devolutions Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2022.3.12", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper access control in the secure messages feature in Devolutions Server 2022.3.12 and below allows an authenticated attacker that possesses the message UUID to access the data it contains.<br></div>", }, ], value: "Improper access control in the secure messages feature in Devolutions Server 2022.3.12 and below allows an authenticated attacker that possesses the message UUID to access the data it contains.\n\n\n", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-03-10T20:05:13.704Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0005", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-1201", datePublished: "2023-03-06T17:15:00.735Z", dateReserved: "2023-03-06T15:51:14.721Z", dateUpdated: "2025-03-06T14:53:59.575Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-6512
Vulnerability from cvelistv5
Published
2024-09-25 13:55
Modified
2025-03-14 15:49
Severity ?
EPSS score ?
Summary
Authorization bypass in the PAM access request approval mechanism in Devolutions Server 2024.2.10 and earlier allows authenticated users with permissions to approve their own requests, bypassing intended security restrictions, via the PAM access request approval mechanism.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Devolutions Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2024-6512", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-25T14:23:03.639394Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-14T15:49:24.390Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", ], product: "Devolutions Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.2.10.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], datePublic: "2024-09-25T12:36:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Authorization bypass in the PAM access request approval mechanism in Devolutions Server 2024.2.10 and earlier allows authenticated users with permissions to approve their own requests, bypassing intended security restrictions, via the PAM access request approval mechanism.\n\n<br>", }, ], value: "Authorization bypass in the PAM access request approval mechanism in Devolutions Server 2024.2.10 and earlier allows authenticated users with permissions to approve their own requests, bypassing intended security restrictions, via the PAM access request approval mechanism.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "CWE-863: Incorrect Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-25T13:55:28.818Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0013", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-6512", datePublished: "2024-09-25T13:55:28.818Z", dateReserved: "2024-07-04T13:18:53.683Z", dateUpdated: "2025-03-14T15:49:24.390Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-33996
Vulnerability from cvelistv5
Published
2022-07-07 11:19
Modified
2024-08-03 08:16
Severity ?
EPSS score ?
Summary
Incorrect permission management in Devolutions Server before 2022.2 allows a new user with a preexisting username to inherit the permissions of that previous user.
References
▼ | URL | Tags |
---|---|---|
https://devolutions.net | x_refsource_MISC | |
https://devolutions.net/security/advisories/DEVO-2022-0006 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T08:16:16.062Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://devolutions.net", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2022-0006", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Incorrect permission management in Devolutions Server before 2022.2 allows a new user with a preexisting username to inherit the permissions of that previous user.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-07-07T11:19:54", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://devolutions.net", }, { tags: [ "x_refsource_MISC", ], url: "https://devolutions.net/security/advisories/DEVO-2022-0006", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2022-33996", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Incorrect permission management in Devolutions Server before 2022.2 allows a new user with a preexisting username to inherit the permissions of that previous user.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://devolutions.net", refsource: "MISC", url: "https://devolutions.net", }, { name: "https://devolutions.net/security/advisories/DEVO-2022-0006", refsource: "MISC", url: "https://devolutions.net/security/advisories/DEVO-2022-0006", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-33996", datePublished: "2022-07-07T11:19:54", dateReserved: "2022-06-19T00:00:00", dateUpdated: "2024-08-03T08:16:16.062Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-1764
Vulnerability from cvelistv5
Published
2024-03-05 21:35
Modified
2024-12-04 15:42
Severity ?
EPSS score ?
Summary
Improper privilege management in Just-in-time (JIT) elevation module in Devolutions Server 2023.3.14.0 and earlier allows a user to continue using the elevated privilege even after the expiration under specific circumstances
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-01T18:48:21.983Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.6, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, }, { other: { content: { id: "CVE-2024-1764", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-05T20:23:51.915244Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-04T15:42:58.365Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", modules: [ "Just-in-time (JIT) elevation module", ], product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2023.3.14.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper privilege management in Just-in-time (JIT) elevation module in Devolutions Server 2023.3.14.0 and earlier allows a user to continue using the elevated privilege even after the expiration under specific circumstances<br></div>", }, ], value: "Improper privilege management in Just-in-time (JIT) elevation module in Devolutions Server 2023.3.14.0 and earlier allows a user to continue using the elevated privilege even after the expiration under specific circumstances\n\n\n", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-269", description: "CWE-269 Improper Privilege Management", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-03-05T21:35:52.233Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2024-0002", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2024-1764", datePublished: "2024-03-05T21:35:52.233Z", dateReserved: "2024-02-22T15:54:24.026Z", dateUpdated: "2024-12-04T15:42:58.365Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-0953
Vulnerability from cvelistv5
Published
2023-02-22 13:42
Modified
2025-03-12 13:55
Severity ?
EPSS score ?
Summary
Insufficient input sanitization in the documentation feature of Devolutions Server 2022.3.12 and earlier allows an authenticated attacker to perform an SQL Injection, potentially resulting in unauthorized access to system resources.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Devolutions Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T05:32:45.459Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0003", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-0953", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-03-12T13:51:35.439529Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-12T13:55:52.607Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Devolutions Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2022.3.12", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Insufficient input sanitization in the documentation feature of Devolutions Server 2022.3.12 and earlier allows an authenticated attacker to perform an SQL Injection, potentially resulting in unauthorized access to system resources.<br></div>", }, ], value: "Insufficient input sanitization in the documentation feature of Devolutions Server 2022.3.12 and earlier allows an authenticated attacker to perform an SQL Injection, potentially resulting in unauthorized access to system resources.\n\n\n", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-03-01T05:45:13.020Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0003", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-0953", datePublished: "2023-02-22T13:42:04.305Z", dateReserved: "2023-02-22T13:27:32.322Z", dateUpdated: "2025-03-12T13:55:52.607Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-2278
Vulnerability from cvelistv5
Published
2025-03-13 12:56
Modified
2025-03-18 16:18
Severity ?
EPSS score ?
Summary
Improper access control in temporary access requests and checkout requests endpoints in Devolutions Server 2024.3.13 and earlier allows an authenticated user to access information about these requests via a known request ID.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2025-2278", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-03-18T16:18:41.296906Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-18T16:18:46.095Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.3.13", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper access control in temporary access requests and checkout requests endpoints in Devolutions Server 2024.3.13 and earlier allows an authenticated user to access information about these requests via a known request ID.</div>", }, ], value: "Improper access control in temporary access requests and checkout requests endpoints in Devolutions Server 2024.3.13 and earlier allows an authenticated user to access information about these requests via a known request ID.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284: Improper Access Control", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-13T12:56:04.995Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2025-0004/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2025-2278", datePublished: "2025-03-13T12:56:04.995Z", dateReserved: "2025-03-13T12:49:12.091Z", dateUpdated: "2025-03-18T16:18:46.095Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-0952
Vulnerability from cvelistv5
Published
2023-02-22 13:51
Modified
2025-03-17 18:28
Severity ?
EPSS score ?
Summary
Improper access controls on entries in Devolutions Server
2022.3.12 and earlier could allow an authenticated user to access
sensitive data without proper authorization.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Devolutions Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T05:32:45.336Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0003", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2023-0952", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-03-12T14:51:36.342464Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "CWE-863 Incorrect Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-17T18:28:29.860Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Devolutions Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2022.3.12", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper access controls on entries in Devolutions Server \n2022.3.12 and earlier could allow an authenticated user to access \nsensitive data without proper authorization.", }, ], value: "Improper access controls on entries in Devolutions Server \n2022.3.12 and earlier could allow an authenticated user to access \nsensitive data without proper authorization.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-03-01T05:45:13.020Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0003", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-0952", datePublished: "2023-02-22T13:51:39.898Z", dateReserved: "2023-02-22T13:18:37.597Z", dateUpdated: "2025-03-17T18:28:29.860Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-23924
Vulnerability from cvelistv5
Published
2021-04-01 21:48
Modified
2024-08-03 19:14
Severity ?
EPSS score ?
Summary
An issue was discovered in Devolutions Server before 2020.3. There is an exposure of sensitive information in diagnostic files.
References
▼ | URL | Tags |
---|---|---|
https://devolutions.net/security/advisories/devo-2021-0002 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T19:14:09.399Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-03-30T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in Devolutions Server before 2020.3. There is an exposure of sensitive information in diagnostic files.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-01T21:48:52", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-23924", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in Devolutions Server before 2020.3. There is an exposure of sensitive information in diagnostic files.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://devolutions.net/security/advisories/devo-2021-0002", refsource: "CONFIRM", url: "https://devolutions.net/security/advisories/devo-2021-0002", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-23924", datePublished: "2021-04-01T21:48:52", dateReserved: "2021-01-12T00:00:00", dateUpdated: "2024-08-03T19:14:09.399Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-5358
Vulnerability from cvelistv5
Published
2023-11-01 17:17
Modified
2024-09-06 18:40
Severity ?
EPSS score ?
Summary
Improper access control in Report log filters feature in Devolutions Server 2023.2.10.0 and earlier allows attackers to retrieve logs from vaults or entries they are not allowed to access via the report request url query parameters.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Devolutions Server |
Version: 0 < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T07:59:43.681Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://devolutions.net/security/advisories/DEVO-2023-0019/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-5358", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-06T18:39:00.410240Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-06T18:40:19.905Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", ], product: "Devolutions Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2023.2.10.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper access control in Report log filters feature in Devolutions Server 2023.2.10.0 and earlier allows attackers to retrieve logs from vaults or entries they are not allowed to access via the report request url query parameters.", }, ], value: "Improper access control in Report log filters feature in Devolutions Server 2023.2.10.0 and earlier allows attackers to retrieve logs from vaults or entries they are not allowed to access via the report request url query parameters.", }, ], providerMetadata: { dateUpdated: "2023-11-01T17:18:14.337Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2023-0019/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2023-5358", datePublished: "2023-11-01T17:17:31.501Z", dateReserved: "2023-10-03T13:22:28.118Z", dateUpdated: "2024-09-06T18:40:19.905Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-2280
Vulnerability from cvelistv5
Published
2025-03-13 13:02
Modified
2025-03-19 13:22
Severity ?
EPSS score ?
Summary
Improper access control in web extension restriction feature in Devolutions Server 2024.3.4.0
and earlier allows an authenticated user to bypass the browser extension restriction feature.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Devolutions | Server |
Version: 0 < |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2025-2280", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-03-18T16:15:18.224214Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-18T16:17:41.375Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Server", vendor: "Devolutions", versions: [ { lessThanOrEqual: "2024.3.4.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<div>Improper access control in web extension restriction feature in Devolutions Server 2024.3.4.0\n\n and earlier allows an authenticated user to bypass the browser extension restriction feature.</div>", }, ], value: "Improper access control in web extension restriction feature in Devolutions Server 2024.3.4.0\n\n and earlier allows an authenticated user to bypass the browser extension restriction feature.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284: Improper Access Control", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-19T13:22:55.007Z", orgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", shortName: "DEVOLUTIONS", }, references: [ { url: "https://devolutions.net/security/advisories/DEVO-2025-0004/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "bfee16bd-18e6-446c-9a65-f5b2e3d89c23", assignerShortName: "DEVOLUTIONS", cveId: "CVE-2025-2280", datePublished: "2025-03-13T13:02:47.702Z", dateReserved: "2025-03-13T12:57:58.848Z", dateUpdated: "2025-03-19T13:22:55.007Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }