Plaintext credential usage vulnerability in Sage 200 Spain 2023.38.001 version, the exploitation of which could allow a remote attacker to extract SQL database credentials from the DLL application. This vulnerability could be linked to known techniques to obtain remote execution of MS SQL commands and escalate privileges on Windows systems because the credentials are stored in plaintext.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso/use-cleartext-credentials-sage-200 | Third Party Advisory |
Configurations
History
05 Oct 2023, 17:06
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-312 | |
CPE | cpe:2.3:a:sage:sage_200_spain:2023.38.001:*:*:*:*:*:*:* | |
References | (MISC) https://www.incibe.es/en/incibe-cert/notices/aviso/use-cleartext-credentials-sage-200 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Sage sage 200 Spain
Sage |
04 Oct 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-04 11:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-2809
Mitre link : CVE-2023-2809
CVE.ORG link : CVE-2023-2809
JSON object : View
Products Affected
sage
- sage_200_spain
CWE
CWE-312
Cleartext Storage of Sensitive Information