CVE-2023-2809

Plaintext credential usage vulnerability in Sage 200 Spain 2023.38.001 version, the exploitation of which could allow a remote attacker to extract SQL database credentials from the DLL application. This vulnerability could be linked to known techniques to obtain remote execution of MS SQL commands and escalate privileges on Windows systems because the credentials are stored in plaintext.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sage:sage_200_spain:2023.38.001:*:*:*:*:*:*:*

History

05 Oct 2023, 17:06

Type Values Removed Values Added
CWE CWE-312
CPE cpe:2.3:a:sage:sage_200_spain:2023.38.001:*:*:*:*:*:*:*
References (MISC) https://www.incibe.es/en/incibe-cert/notices/aviso/use-cleartext-credentials-sage-200 - (MISC) https://www.incibe.es/en/incibe-cert/notices/aviso/use-cleartext-credentials-sage-200 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Sage sage 200 Spain
Sage

04 Oct 2023, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-04 11:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-2809

Mitre link : CVE-2023-2809

CVE.ORG link : CVE-2023-2809


JSON object : View

Products Affected

sage

  • sage_200_spain
CWE
CWE-312

Cleartext Storage of Sensitive Information