CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
35.2%
A password management vulnerability in Skyhigh Secure Web Gateway (SWG) in main releases 11.x prior to 11.2.14, 10.x prior to 10.2.25 and controlled release 12.x prior to 12.2.1, allows some authentication information stored in configuration files to be extracted through SWG REST API. This was possible due to SWG storing the password in plain text in some configuration files.
[
{
"defaultStatus": "unaffected",
"product": "Skyhigh Secure Web Gateway (SWG) ",
"vendor": "Skyhigh Security",
"versions": [
{
"lessThan": "11.2.14",
"status": "affected",
"version": "11.x",
"versionType": "custom"
},
{
"lessThan": "10.2.25",
"status": "affected",
"version": "10.x",
"versionType": "custom"
},
{
"lessThan": "12.2.1",
"status": "affected",
"version": "12.x",
"versionType": "custom"
}
]
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
35.2%