Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 18 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In deployments using the ScreenConnectâ„¢ Certificate Signing Extension, encrypted configuration values including an Azure Key Vault-related key, could be returned to unauthenticated users through a client-facing endpoint under certain conditions. The values remained encrypted and securely stored at rest; however, an encrypted representation could be exposed in client responses. Updating the Certificate Signing Extension to version 1.0.12 or higher ensures configuration handling occurs exclusively on the server side, preventing encrypted values from being transmitted to or rendered by client-side components. | |
| Title | Certificate Signing Extension Returns Encrypted Values | |
| Weaknesses | CWE-201 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ConnectWise
Published:
Updated: 2025-12-18T16:04:17.893Z
Reserved: 2025-12-17T11:56:55.302Z
Link: CVE-2025-14823
Updated: 2025-12-18T16:03:36.090Z
Status : Received
Published: 2025-12-18T16:15:52.503
Modified: 2025-12-18T16:15:52.503
Link: CVE-2025-14823
No data.
OpenCVE Enrichment
No data.