{"dataType":"CVE_RECORD","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-31840","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2025-03-14T14:52:16.101Z","datePublished":"2024-05-21T15:32:37.989Z","dateReserved":"2024-04-05T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2024-05-21T15:32:38.274Z"},"descriptions":[{"lang":"en","value":"An issue was discovered in Italtel Embrace 1.6.4. The web application inserts cleartext passwords in the HTML source code. An authenticated user is able to edit the configuration of the email server. Once the user access the edit function, the web application fills the edit form with the current credentials for the email account, including the cleartext password."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://www.gruppotim.it/it/footer/red-team.html"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T01:59:49.780Z"},"title":"CVE Program Container","references":[{"url":"https://www.gruppotim.it/it/footer/red-team.html","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-319","lang":"en","description":"CWE-319 Cleartext Transmission of Sensitive Information"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-312","lang":"en","description":"CWE-312 Cleartext Storage of Sensitive Information"}]}],"affected":[{"vendor":"italtel","product":"embrace","cpes":["cpe:2.3:a:italtel:embrace:1.6.4:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.6.4","status":"affected"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.5,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-03-14T14:51:59.405260Z","id":"CVE-2024-31840","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-14T14:52:16.101Z"}}]},"dataVersion":"5.1"}