Attackers Can Easily Decrypt and Use Stolen Passwords to Corrupt the System
CVE-2024-3543
7.5HIGH
Summary
The ECS Connection Manager by Kemp Technologies is susceptible to a flaw in its password encryption protocol. This vulnerability stems from the use of a reversible encryption algorithm that allows malicious actors to effectively decrypt stored passwords. Once attackers gain access to these sensitive credentials, they can perform unauthorized actions, leading to system corruption and exposure of confidential data. Organizations using the ECS Connection Manager should urgently assess their systems to mitigate potential risks associated with this security issue.
Affected Version(s)
LoadMaster LoadMaster 7.2.55.0 (GA)
LoadMaster LoadMaster 7.2.55.0 (GA) < 7.2.59.4
LoadMaster LoadMaster 7.2.49.0 (LTSF) < 7.2.54.10
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Agenzia per la Cybersicurezza Nazionale (ACN)