An insufficiently protected credentials vulnerability has been reported to affect QVPN Device Client. If exploited, the vulnerability could allow local authenticated administrators to gain access to user accounts and access sensitive data used by the user account via unspecified vectors.
We have already fixed the vulnerability in the following version:
QVPN Windows 2.1.0.0518 and later
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-23-36 |     | 
History
                    Thu, 19 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: qnap
Published: 2023-10-06T16:35:48.415Z
Updated: 2024-09-19T14:45:53.657Z
Reserved: 2023-01-11T20:15:53.086Z
Link: CVE-2023-23370
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T10:28:40.814Z
 NVD
                        NVD
                    Status : Modified
Published: 2023-10-06T17:15:11.920
Modified: 2024-11-21T07:46:03.010
Link: CVE-2023-23370
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow