CVE-2023-27927 Vulnerability Details

  /     /     /  

CVE-2023-27927 Metadata Quick Info

CVE Published: 27/03/2023 | CVE Updated: 02/08/2024 | CVE Year: 2023
Source: icscert | Vendor: SAUTER | Product: EY-AS525F001 with moduWeb
Status : PUBLISHED

CVE-2023-27927 Description

An authenticated malicious user could acquire the simple mail transfer protocol (SMTP) Password in cleartext format, despite it being protected and hidden behind asterisks. The attacker could then perform further attacks using the SMTP credentials.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID:
CWE Name: CWE-319 Cleartext Transmission of Sensitive Information
Source: SAUTER

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).