fkie_cve-2023-50444
Vulnerability from fkie_nvd
Published
2023-12-13 20:15
Modified
2024-11-21 08:37
Severity ?
Summary
By default, .ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission); ZED! for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before 2023.5; ZEDMAIL for Windows before 2023.5; and ZED! for Windows, Mac, Linux before 2023.5 include an encrypted version of sensitive user information, which could allow an unauthenticated attacker to obtain it via brute force.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:primx:zed\\!:*:*:*:*:enterprise:windows:*:*",
"matchCriteriaId": "7C67598A-6CE7-4802-BB1F-65D40CF38DAC",
"versionEndExcluding": "q.2020.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:primx:zed\\!:*:*:*:*:enterprise:windows:*:*",
"matchCriteriaId": "1B21D96F-47D7-4DE6-80AD-68986FF75C77",
"versionEndExcluding": "2023.5",
"versionStartIncluding": "2023.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:primx:zed\\!:*:*:*:*:enterprise:windows:*:*",
"matchCriteriaId": "747C7A04-7E6E-4A2C-BCFC-01EC16ABE951",
"versionEndExcluding": "q.2021.2",
"versionStartIncluding": "q.2021.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:primx:zedmail:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "01B1BDF0-697E-4EA2-8E26-5B786E03FCF1",
"versionEndExcluding": "2023.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:primx:zonecentral:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "60E1C4D1-FD43-44D1-90E3-0A3936D947A2",
"versionEndExcluding": "q.2021.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:primx:zonecentral:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "5FA52575-445D-48F8-B1D9-F3981DDBD5D3",
"versionEndExcluding": "2023.5",
"versionStartIncluding": "2023.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "By default, .ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission); ZED! for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before 2023.5; ZEDMAIL for Windows before 2023.5; and ZED! for Windows, Mac, Linux before 2023.5 include an encrypted version of sensitive user information, which could allow an unauthenticated attacker to obtain it via brute force."
},
{
"lang": "es",
"value": "De forma predeterminada, los contenedores ZED producidos por PRIMX ZED! para Windows anteriores a Q.2020.3 (presentaci\u00f3n de calificaci\u00f3n ANSSI); ZED! para Windows anteriores a Q.2021.2 (presentaci\u00f3n de calificaci\u00f3n ANSSI); ZONECENTRAL para Windows antes de Q.2021.2 (presentaci\u00f3n de calificaci\u00f3n ANSSI); ZONECENTRAL para Windows antes de 2023.5; ZEDMAIL para Windows antes de 2023.5; y ZED! para Windows, Mac y Linux anteriores a 2023.5 incluyen una versi\u00f3n cifrada de informaci\u00f3n confidencial del usuario, lo que podr\u00eda permitir que un atacante no autenticado la obtenga mediante fuerza bruta."
}
],
"id": "CVE-2023-50444",
"lastModified": "2024-11-21T08:37:00.407",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-12-13T20:15:49.840",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.primx.eu/en/bulletins/security-bulletin-23B30874/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.primx.eu/fr/blog/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.primx.eu/en/bulletins/security-bulletin-23B30874/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://www.primx.eu/fr/blog/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-307"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…