Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-12871 | Improper Input Validation, Authorization Bypass Through User-Controlled Key vulnerability in Kron Tech Single Connect on Windows allows Privilege Abuse. This issue affects Single Connect: 2.16. |
Solution
Apply the patch on https://filerepo.krontech.com/index.php/s/VQRlYxpzsECp3UU https://filerepo.krontech.com/index.php/s/VQRlYxpzsECp3UU (md5sum: 6fea2b58915854b663f43fdf4516522a, instructions on https://docs.krontech.com/singleconnect-2-16/update-patch-rdp-proxy-idor-vulnerability https://docs.krontech.com/singleconnect-2-16/update-patch-rdp-proxy-idor-vulnerability ) https://docs.krontech.com/singleconnect-2-16/update-patch-rdp-proxy-idor-vulnerability ) and update the Single Connect (PAM) to version 2.16.1.
Workaround
No workaround given by the vendor.
Wed, 12 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: TR-CERT
Published:
Updated: 2025-03-12T20:11:39.684Z
Reserved: 2023-02-17T05:16:54.142Z
Link: CVE-2023-0882
Updated: 2024-08-02T05:24:34.698Z
Status : Modified
Published: 2023-02-17T10:15:11.297
Modified: 2024-11-21T07:38:01.773
Link: CVE-2023-0882
No data.
OpenCVE Enrichment
No data.
EUVD