fkie_cve-2024-23551
Vulnerability from fkie_nvd
Published
2024-05-07 22:15
Modified
2024-11-21 08:57
Summary
Database scanning using username and password stores the credentials in plaintext or encoded format within files at the endpoint. This has been identified as a significant security risk. This will lead to exposure of sensitive information for unauthorized access, potentially leading to severe consequences such as data breaches, unauthorized data manipulation, and compromised system integrity.
Impacted products
Vendor Product Version



{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Database scanning using username and password stores the credentials in\u00a0plaintext or encoded format within files at the endpoint. This has been identified as a significant\u00a0security risk. This will lead to exposure of sensitive information for unauthorized access,\u00a0potentially leading to severe consequences such as data breaches, unauthorized data\u00a0manipulation, and compromised system integrity."
    },
    {
      "lang": "es",
      "value": "El escaneo de la base de datos mediante nombre de usuario y contrase\u00f1a almacena las credenciales en texto sin formato o en formato codificado dentro de archivos en el endpoint. Esto ha sido identificado como un riesgo de seguridad importante. Esto dar\u00e1 lugar a la exposici\u00f3n de informaci\u00f3n confidencial para acceso no autorizado, lo que podr\u00eda tener consecuencias graves, como violaciones de datos, manipulaci\u00f3n de datos no autorizada y compromiso de la integridad del sistema."
    }
  ],
  "id": "CVE-2024-23551",
  "lastModified": "2024-11-21T08:57:55.557",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.6,
        "impactScore": 5.9,
        "source": "psirt@hcl.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-05-07T22:15:07.560",
  "references": [
    {
      "source": "psirt@hcl.com",
      "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0112963"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0112963"
    }
  ],
  "sourceIdentifier": "psirt@hcl.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-522"
        }
      ],
      "source": "psirt@hcl.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.