{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6588","assignerOrgId":"bfee16bd-18e6-446c-9a65-f5b2e3d89c23","state":"PUBLISHED","assignerShortName":"DEVOLUTIONS","dateReserved":"2023-12-07T15:41:50.627Z","datePublished":"2023-12-07T15:59:19.821Z","dateUpdated":"2024-08-02T08:35:14.826Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["Offline Mode","Devolutions Server Data Source"],"product":"Workspace","vendor":"Devolutions","versions":[{"status":"affected","version":"0"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div><br></div><div>\nOffline mode is always enabled, even if permission disallows it, in \nDevolutions Server data source in Devolutions Workspace 2023.3.2.0 and \nearlier. This allows an attacker with access to the Workspace \napplication to access credentials when offline.\n\n<br></div>"}],"value":"\n\n\nOffline mode is always enabled, even if permission disallows it, in \nDevolutions Server data source in Devolutions Workspace 2023.3.2.0 and \nearlier. This allows an attacker with access to the Workspace \napplication to access credentials when offline.\n\n\n\n\n"}],"providerMetadata":{"orgId":"bfee16bd-18e6-446c-9a65-f5b2e3d89c23","shortName":"DEVOLUTIONS","dateUpdated":"2023-12-07T15:59:19.821Z"},"references":[{"url":"https://devolutions.net/security/advisories/DEVO-2023-0022/"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:35:14.826Z"},"title":"CVE Program Container","references":[{"url":"https://devolutions.net/security/advisories/DEVO-2023-0022/","tags":["x_transferred"]}]}]}}