Vulnerability Description
FileZilla v3.59.0 allows attackers to obtain cleartext passwords of connected SSH or FTP servers via a memory dump.- NOTE: the vendor does not consider this a vulnerability
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Filezilla-Project | Filezilla Client | 3.59.0 |
Related Weaknesses (CWE)
References
- https://whichbuffer.medium.com/filezilla-client-cleartext-storage-of-sensitive-iExploitThird Party Advisory
- https://youtu.be/ErZl1i7McHkExploitThird Party Advisory
- https://youtu.be/eSlfQQytIq0Broken Link
- https://whichbuffer.medium.com/filezilla-client-cleartext-storage-of-sensitive-iExploitThird Party Advisory
- https://youtu.be/ErZl1i7McHkExploitThird Party Advisory
- https://youtu.be/eSlfQQytIq0Broken Link
FAQ
What is CVE-2022-29620?
CVE-2022-29620 is a vulnerability with a CVSS score of 6.5 (MEDIUM). FileZilla v3.59.0 allows attackers to obtain cleartext passwords of connected SSH or FTP servers via a memory dump.- NOTE: the vendor does not consider this a vulnerability
How severe is CVE-2022-29620?
CVE-2022-29620 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-29620?
Check the references section above for vendor advisories and patch information. Affected products include: Filezilla-Project Filezilla Client.