CVE-2023-27927

An authenticated malicious user could acquire the simple mail transfer protocol (SMTP) Password in cleartext format, despite it being protected and hidden behind asterisks. The attacker could then perform further attacks using the SMTP credentials.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sauter-controls:ey-as525f001_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sauter-controls:ey-as525f001:-:*:*:*:*:*:*:*

History

31 Mar 2023, 13:35

Type Values Removed Values Added
First Time Sauter-controls ey-as525f001 Firmware
Sauter-controls
Sauter-controls ey-as525f001
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 - (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 - Third Party Advisory, US Government Resource
CWE CWE-319
CPE cpe:2.3:o:sauter-controls:ey-as525f001_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sauter-controls:ey-as525f001:-:*:*:*:*:*:*:*

27 Mar 2023, 20:38

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-27 20:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-27927

Mitre link : CVE-2023-27927

CVE.ORG link : CVE-2023-27927


JSON object : View

Products Affected

sauter-controls

  • ey-as525f001_firmware
  • ey-as525f001
CWE
CWE-319

Cleartext Transmission of Sensitive Information