Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting.
References
Link | Resource |
---|---|
https://github.com/l00neyhacker/CVE-2023-23130 | Third Party Advisory |
https://github.com/l00neyhacker/CVE-2023-23130 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/l00neyhacker/CVE-2023-23130 - Third Party Advisory |
07 Nov 2023, 04:07
Type | Values Removed | Values Added |
---|---|---|
Summary | Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting. |
Information
Published : 2023-02-01 14:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-23130
Mitre link : CVE-2023-23130
CVE.ORG link : CVE-2023-23130
JSON object : View
Products Affected
connectwise
- automate
CWE
CWE-319
Cleartext Transmission of Sensitive Information