Improper Input Validation, Authorization Bypass Through User-Controlled Key vulnerability in Kron Tech Single Connect on Windows allows Privilege Abuse. This issue affects Single Connect: 2.16.
Fixes

Solution

Apply the patch on  https://filerepo.krontech.com/index.php/s/VQRlYxpzsECp3UU https://filerepo.krontech.com/index.php/s/VQRlYxpzsECp3UU   (md5sum: 6fea2b58915854b663f43fdf4516522a, instructions on https://docs.krontech.com/singleconnect-2-16/update-patch-rdp-proxy-idor-vulnerability https://docs.krontech.com/singleconnect-2-16/update-patch-rdp-proxy-idor-vulnerability ) https://docs.krontech.com/singleconnect-2-16/update-patch-rdp-proxy-idor-vulnerability )  and update the Single Connect (PAM) to version 2.16.1.


Workaround

No workaround given by the vendor.

History

Wed, 12 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TR-CERT

Published:

Updated: 2025-03-12T20:11:39.684Z

Reserved: 2023-02-17T05:16:54.142Z

Link: CVE-2023-0882

cve-icon Vulnrichment

Updated: 2024-08-02T05:24:34.698Z

cve-icon NVD

Status : Modified

Published: 2023-02-17T10:15:11.297

Modified: 2024-11-21T07:38:01.773

Link: CVE-2023-0882

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.