Vulnerability Description
VDG Security SENSE (formerly DIVA) 2.3.13 sends the user database when a user logs in, which allows remote authenticated users to obtain usernames and password hashes by logging in to TCP port 51410 and reading the response.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vdgsecurity | Vdg Sense | 2.3.13 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-DisclExploit
- http://seclists.org/fulldisclosure/2014/Dec/76Exploit
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-Exploit
- http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-DisclExploit
- http://seclists.org/fulldisclosure/2014/Dec/76Exploit
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-Exploit
FAQ
What is CVE-2014-9577?
CVE-2014-9577 is a vulnerability with a CVSS score of 4.0 (MEDIUM). VDG Security SENSE (formerly DIVA) 2.3.13 sends the user database when a user logs in, which allows remote authenticated users to obtain usernames and password hashes by logging in to TCP port 51410 a...
How severe is CVE-2014-9577?
CVE-2014-9577 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9577?
Check the references section above for vendor advisories and patch information. Affected products include: Vdgsecurity Vdg Sense.