Attackers Can Easily Decrypt and Use Stolen Passwords to Corrupt the System
CVE-2024-3543

7.5HIGH

Key Information:

Vendor
CVE Published:
2 May 2024

Summary

The ECS Connection Manager by Kemp Technologies is susceptible to a flaw in its password encryption protocol. This vulnerability stems from the use of a reversible encryption algorithm that allows malicious actors to effectively decrypt stored passwords. Once attackers gain access to these sensitive credentials, they can perform unauthorized actions, leading to system corruption and exposure of confidential data. Organizations using the ECS Connection Manager should urgently assess their systems to mitigate potential risks associated with this security issue.

Affected Version(s)

LoadMaster LoadMaster 7.2.55.0 (GA)

LoadMaster LoadMaster 7.2.55.0 (GA) < 7.2.59.4

LoadMaster LoadMaster 7.2.49.0 (LTSF) < 7.2.54.10

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Agenzia per la Cybersicurezza Nazionale (ACN)
.