CVE-2023-27927

An authenticated malicious user could acquire the simple mail transfer protocol (SMTP) Password in cleartext format, despite it being protected and hidden behind asterisks. The attacker could then perform further attacks using the SMTP credentials.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 Third Party Advisory US Government Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sauter-controls:ey-as525f001_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sauter-controls:ey-as525f001:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:53

Type Values Removed Values Added
References () https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 - Third Party Advisory, US Government Resource () https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 - Third Party Advisory, US Government Resource

Information

Published : 2023-03-27 20:15

Updated : 2024-11-21 07:53


NVD link : CVE-2023-27927

Mitre link : CVE-2023-27927

CVE.ORG link : CVE-2023-27927


JSON object : View

Products Affected

sauter-controls

  • ey-as525f001_firmware
  • ey-as525f001
CWE
CWE-319

Cleartext Transmission of Sensitive Information