Plaintext credential usage vulnerability in Sage 200 Spain 2023.38.001 version, the exploitation of which could allow a remote attacker to extract SQL database credentials from the DLL application. This vulnerability could be linked to known techniques to obtain remote execution of MS SQL commands and escalate privileges on Windows systems because the credentials are stored in plaintext.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso/use-cleartext-credentials-sage-200 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: INCIBE
Published: 2023-10-04T10:49:56.429Z
Updated: 2023-12-19T14:34:45.575Z
Reserved: 2023-05-19T10:54:17.589Z
Link: CVE-2023-2809
JSON object: View
NVD Information
Status : Modified
Published: 2023-10-04T11:15:10.223
Modified: 2023-12-19T15:15:08.230
Link: CVE-2023-2809
JSON object: View
Redhat Information
No data.
CWE