Intuit Lacerte 2017 for Windows in a client/server environment transfers the entire customer list in cleartext over SMB, which allows attackers to (1) obtain sensitive information by sniffing the network or (2) conduct man-in-the-middle (MITM) attacks via unspecified vectors. The customer list contains each customer's full name, social security number (SSN), address, job title, phone number, Email address, spouse's phone/Email address, and other sensitive information. After the client software authenticates to the server database, the server sends the customer list. There is no need for further exploitation as all sensitive data is exposed. This vulnerability was validated on Intuit Lacerte 2017, however older versions of Lacerte may be vulnerable.
References
Link | Resource |
---|---|
https://corporateblue.com/your-taxes-are-being-leaked/ | Third Party Advisory URL Repurposed |
https://www.themikewylie.com/intuit-lacerte-vulnerability-and-data-exposure-cve-2018-11338-cve-2018-14833/ |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-07-31T14:00:00
Updated: 2019-09-30T13:17:34
Reserved: 2018-05-21T00:00:00
Link: CVE-2018-11338
JSON object: View
NVD Information
Status : Modified
Published: 2018-07-31T14:29:00.387
Modified: 2024-02-14T01:17:43.863
Link: CVE-2018-11338
JSON object: View
Redhat Information
No data.
CWE