logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2023-30367

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2023-30367

Description:
Multi-Remote Next Generation Connection Manager (mRemoteNG) is free software that enables users to store and manage multi-protocol connection configurations to remotely connect to systems. mRemoteNG configuration files can be stored in an encrypted state on disk. mRemoteNG version <= v1.76.20 and <= 1.77.3-dev loads configuration files in plain text into memory (after decrypting them if necessary) at application start-up, even if no connection has been established yet. This allows attackers to access contents of configuration files in plain text through a memory dump and thus compromise user credentials when no custom password encryption key has been set. This also bypasses the connection configuration file encryption setting by dumping already decrypted configurations from memory.
Last updated date:
08/04/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/08/2023
Reference url to background

https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper

Type:
exploit
Confidence:
HIGH
Date of publishing:
08/04/2023
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy