Sage 300 through 2022 uses a hard-coded 40-byte blowfish key to encrypt and decrypt user passwords and SQL connection strings stored in ISAM database files in the shared data directory. This issue could allow attackers to decrypt user passwords and SQL connection strings.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-44595 | Sage 300 through 2022 uses a hard-coded 40-byte blowfish key to encrypt and decrypt user passwords and SQL connection strings stored in ISAM database files in the shared data directory. This issue could allow attackers to decrypt user passwords and SQL connection strings. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.sage.com/en-ca/products/sage-300/ |
|
History
Thu, 30 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-30T20:35:22.232Z
Reserved: 2022-09-26T00:00:00.000Z
Link: CVE-2022-41400
Updated: 2024-08-03T12:42:46.205Z
Status : Modified
Published: 2023-04-28T13:15:13.560
Modified: 2025-01-30T21:15:09.157
Link: CVE-2022-41400
No data.
OpenCVE Enrichment
No data.
EUVD