Lucene search

K
nvd[email protected]NVD:CVE-2023-29064
HistoryNov 28, 2023 - 9:15 p.m.

CVE-2023-29064

2023-11-2821:15:07
CWE-798
web.nvd.nist.gov
3
facschorus plaintext data threat tokens passwords admin

4.3 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

0.0004 Low

EPSS

Percentile

12.8%

The FACSChorus software contains sensitive information stored in plaintext. A threat actor could gain hardcoded secrets used by the application, which include tokens and passwords for administrative accounts.

Affected configurations

NVD
Node
hphp_z2_tower_g9Match-
AND
bdfacschorusMatch5.0
OR
bdfacschorusMatch5.1
Node
hphp_z2_tower_g5Match-
AND
bdfacschorusMatch3.0
OR
bdfacschorusMatch3.1

4.3 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

0.0004 Low

EPSS

Percentile

12.8%

Related for NVD:CVE-2023-29064