A local user may find a configuration file on the client workstation with unencrypted sensitive data. This allows an attacker to impersonate the device or prevent the device from accessing the cloud portal which leads to a DoS.
History

Wed, 20 Aug 2025 06:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-311

Wed, 20 Aug 2025 06:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-312

Tue, 18 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 18 Mar 2025 11:15:00 +0000

Type Values Removed Values Added
Description A local user may find a configuration file on the client workstation with unencrypted sensitive data. This allows an attacker to impersonate the device or prevent the device from accessing the cloud portal which leads to a DoS.
Title MB connect line: Configuration File on the client workstation is not encrypted
Weaknesses CWE-311
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2025-03-18T11:03:35.116Z

Updated: 2025-08-20T06:11:05.971Z

Reserved: 2024-01-24T08:35:23.199Z

Link: CVE-2024-23942

cve-icon Vulnrichment

Updated: 2025-03-18T13:15:03.231Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-03-18T11:15:38.777

Modified: 2025-08-20T06:15:31.637

Link: CVE-2024-23942

cve-icon Redhat

No data.