A cleartext transmission of sensitive information vulnerability has been reported to affect QVPN Device Client. If exploited, the vulnerability could allow local authenticated administrators to read sensitive data via unspecified vectors.
We have already fixed the vulnerability in the following version:
QVPN Windows 2.2.0.0823 and later
We have already fixed the vulnerability in the following version:
QVPN Windows 2.2.0.0823 and later
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-27471 | A cleartext transmission of sensitive information vulnerability has been reported to affect QVPN Device Client. If exploited, the vulnerability could allow local authenticated administrators to read sensitive data via unspecified vectors. We have already fixed the vulnerability in the following version: QVPN Windows 2.2.0.0823 and later |
Fixes
Solution
We have already fixed the vulnerability in the following version: QVPN Windows 2.2.0.0823 and later
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-23-39 |
|
History
Thu, 19 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2024-09-19T14:45:34.271Z
Reserved: 2023-01-11T20:15:53.087Z
Link: CVE-2023-23371
Updated: 2024-08-02T10:28:40.641Z
Status : Modified
Published: 2023-10-06T17:15:11.997
Modified: 2024-11-21T07:46:03.173
Link: CVE-2023-23371
No data.
OpenCVE Enrichment
No data.
EUVD