No-IP Dynamic Update Client (DUC) v3.x uses cleartext credentials that may occur on a command line or in a file. NOTE: the vendor's position is that cleartext in /etc/default/noip-duc is recommended and is the intentional behavior.
History

Thu, 31 Oct 2024 20:00:00 +0000

Type Values Removed Values Added
References

Thu, 24 Oct 2024 18:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-313

Thu, 24 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-312

Thu, 12 Sep 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared No-ip
No-ip duc
Weaknesses CWE-313
CPEs cpe:2.3:a:no-ip:duc:*:*:*:*:*:*:*:*
Vendors & Products No-ip
No-ip duc
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
Description No-IP Dynamic Update Client (DUC) v3.x uses cleartext credentials that may occur on a command line or in a file. NOTE: the vendor's position is that cleartext in /etc/default/noip-duc is recommended and is the intentional behavior.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-09-12T00:00:00

Updated: 2024-10-31T19:43:08.722743

Reserved: 2024-07-05T00:00:00

Link: CVE-2024-40457

cve-icon Vulnrichment

Updated: 2024-09-12T17:05:10.808Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-12T14:16:06.780

Modified: 2024-10-31T20:15:05.173

Link: CVE-2024-40457

cve-icon Redhat

No data.