Plaintext credential usage vulnerability in Sage 200 Spain 2023.38.001 version, the exploitation of which could allow a remote attacker to extract SQL database credentials from the DLL application. This vulnerability could be linked to known techniques to obtain remote execution of MS SQL commands and escalate privileges on Windows systems because the credentials are stored in plaintext.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-34262 | Plaintext credential usage vulnerability in Sage 200 Spain 2023.38.001 version, the exploitation of which could allow a remote attacker to extract SQL database credentials from the DLL application. This vulnerability could be linked to known techniques to obtain remote execution of MS SQL commands and escalate privileges on Windows systems because the credentials are stored in plaintext. |
Fixes
Solution
The vulnerability has been solved by Sage team in the 2023.75 version.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-08-02T06:33:05.522Z
Reserved: 2023-05-19T10:54:17.589Z
Link: CVE-2023-2809

No data.

Status : Modified
Published: 2023-10-04T11:15:10.223
Modified: 2024-11-21T07:59:19.990
Link: CVE-2023-2809

No data.

No data.