Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting.
References
Link | Resource |
---|---|
https://github.com/l00neyhacker/CVE-2023-23130 | Third Party Advisory |
Configurations
History
07 Nov 2023, 04:07
Type | Values Removed | Values Added |
---|---|---|
Summary | Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting. |
08 Feb 2023, 20:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:connectwise:automate:2022.11:*:*:*:*:*:*:* | |
CWE | CWE-319 | |
First Time |
Connectwise
Connectwise automate |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
References | (MISC) https://github.com/l00neyhacker/CVE-2023-23130 - Third Party Advisory |
03 Feb 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
Summary | ** DISPUTED ** Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting. |
01 Feb 2023, 14:45
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-01 14:15
Updated : 2024-04-11 01:18
NVD link : CVE-2023-23130
Mitre link : CVE-2023-23130
CVE.ORG link : CVE-2023-23130
JSON object : View
Products Affected
connectwise
- automate
CWE
CWE-319
Cleartext Transmission of Sensitive Information