No-IP Dynamic Update Client (DUC) v3.x uses cleartext credentials that may occur on a command line or in a file. NOTE: the vendor's position is that cleartext in /etc/default/noip-duc is recommended and is the intentional behavior.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Oct 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 24 Oct 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-313 |
Thu, 24 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-312 |
Thu, 12 Sep 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
No-ip
No-ip duc |
|
Weaknesses | CWE-313 | |
CPEs | cpe:2.3:a:no-ip:duc:*:*:*:*:*:*:*:* | |
Vendors & Products |
No-ip
No-ip duc |
|
Metrics |
cvssV3_1
|
Thu, 12 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No-IP Dynamic Update Client (DUC) v3.x uses cleartext credentials that may occur on a command line or in a file. NOTE: the vendor's position is that cleartext in /etc/default/noip-duc is recommended and is the intentional behavior. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-09-12T00:00:00
Updated: 2024-10-31T19:43:08.722743
Reserved: 2024-07-05T00:00:00
Link: CVE-2024-40457
Vulnrichment
Updated: 2024-09-12T17:05:10.808Z
NVD
Status : Awaiting Analysis
Published: 2024-09-12T14:16:06.780
Modified: 2024-10-31T20:15:05.173
Link: CVE-2024-40457
Redhat
No data.