{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-23370","assignerOrgId":"2fd009eb-170a-4625-932b-17a53af1051f","state":"PUBLISHED","assignerShortName":"qnap","dateReserved":"2023-01-11T20:15:53.086Z","datePublished":"2023-10-06T16:35:48.415Z","dateUpdated":"2024-09-19T14:45:53.657Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"QVPN Windows","vendor":"QNAP Systems Inc.","versions":[{"lessThan":"2.1.0.0518","status":"affected","version":"2.1.x","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Runzi Zhao, Security Researcher, QI-ANXIN"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An insufficiently protected credentials vulnerability has been reported to affect QVPN Device Client. If exploited, the vulnerability could allow local authenticated administrators to gain access to user accounts and access sensitive data used by the user account via unspecified vectors.<br><br>We have already fixed the vulnerability in the following version:<br>QVPN Windows 2.1.0.0518 and later<br>"}],"value":"An insufficiently protected credentials vulnerability has been reported to affect QVPN Device Client. If exploited, the vulnerability could allow local authenticated administrators to gain access to user accounts and access sensitive data used by the user account via unspecified vectors.\n\nWe have already fixed the vulnerability in the following version:\nQVPN Windows 2.1.0.0518 and later\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":6.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-522","description":"CWE-522","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"2fd009eb-170a-4625-932b-17a53af1051f","shortName":"qnap","dateUpdated":"2023-10-06T16:35:48.415Z"},"references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-23-36"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"We have already fixed the vulnerability in the following version:<br>QVPN Windows 2.1.0.0518 and later<br>"}],"value":"We have already fixed the vulnerability in the following version:\nQVPN Windows 2.1.0.0518 and later\n"}],"source":{"advisory":"QSA-23-36","discovery":"EXTERNAL"},"title":"QVPN Device Client","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T10:28:40.814Z"},"title":"CVE Program Container","references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-23-36","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-19T14:24:52.333805Z","id":"CVE-2023-23370","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-19T14:45:53.657Z"}}]}}