CVE-2022-37710

Patterson Dental Eaglesoft 21 has AES-256 encryption but there are two ways to obtain a keyfile: (1) keybackup.data > License > Encryption Key or (2) Eaglesoft.Server.Configuration.data > DbEncryptKeyPrimary > Encryption Key. Applicable files are encrypted with keys and salt that are hardcoded into a DLL or EXE file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pattersondental:eaglesoft:21.0:*:*:*:*:*:*:*

History

08 Nov 2022, 17:12

Type Values Removed Values Added
References (MISC) https://justinshafer.blogspot.com/2022/08/eaglesofts-automatic-aes-256-encryption.html - (MISC) https://justinshafer.blogspot.com/2022/08/eaglesofts-automatic-aes-256-encryption.html - Third Party Advisory
CWE CWE-798
CPE cpe:2.3:a:pattersondental:eaglesoft:21.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

07 Nov 2022, 01:44

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-07 00:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-37710

Mitre link : CVE-2022-37710

CVE.ORG link : CVE-2022-37710


JSON object : View

Products Affected

pattersondental

  • eaglesoft
CWE
CWE-798

Use of Hard-coded Credentials