Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message.
This issue affects SureMDM On-premise: 6.31 and below version
This issue affects SureMDM On-premise: 6.31 and below version
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44523 | Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message. This issue affects SureMDM On-premise: 6.31 and below version |
Fixes
Solution
Upgrade to the latest version of On-premise SureMDM Solution.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message. This issue affects SureMDM On-premise: 6.31 and below version | Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message. This issue affects SureMDM On-premise: 6.31 and below version |
Status: PUBLISHED
Assigner: 42Gears
Published:
Updated: 2025-02-13T17:02:37.670Z
Reserved: 2023-07-25T06:14:06.274Z
Link: CVE-2023-3897
No data.
Status : Modified
Published: 2023-07-25T09:15:11.687
Modified: 2025-02-13T17:16:59.883
Link: CVE-2023-3897
No data.
OpenCVE Enrichment
No data.
EUVD