cve/2023/CVE-2023-43777.md

19 lines
920 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-43777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43777)
![](https://img.shields.io/static/v1?label=Product&message=easySoft&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-256%20Plaintext%20Storage%20of%20a%20Password&color=brighgreen)
### Description
Eaton easySoft software is used to program easy controllers and displays for configuring, programming and defining parameters for all the intelligent relays. This software has a password protection functionality to secure the project file from unauthorized access. This password was being stored insecurely and could be retrieved by skilled adversaries. 
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/SySS-Research/easy-password-recovery
- https://github.com/fkie-cad/nvd-json-data-feeds