Metrics
Affected Vendors & Products
Solution
Apply the patch on https://filerepo.krontech.com/index.php/s/VQRlYxpzsECp3UU https://filerepo.krontech.com/index.php/s/VQRlYxpzsECp3UU (md5sum: 6fea2b58915854b663f43fdf4516522a, instructions on https://docs.krontech.com/singleconnect-2-16/update-patch-rdp-proxy-idor-vulnerability https://docs.krontech.com/singleconnect-2-16/update-patch-rdp-proxy-idor-vulnerability ) https://docs.krontech.com/singleconnect-2-16/update-patch-rdp-proxy-idor-vulnerability ) and update the Single Connect (PAM) to version 2.16.1.
Workaround
No workaround given by the vendor.
Wed, 12 Mar 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: TR-CERT
Published:
Updated: 2025-03-12T20:11:39.684Z
Reserved: 2023-02-17T05:16:54.142Z
Link: CVE-2023-0882

Updated: 2024-08-02T05:24:34.698Z

Status : Modified
Published: 2023-02-17T10:15:11.297
Modified: 2024-11-21T07:38:01.773
Link: CVE-2023-0882

No data.

No data.