CVE-2022-41400

Sage 300 through 2022 uses a hard-coded 40-byte blowfish key to encrypt and decrypt user passwords and SQL connection strings stored in ISAM database files in the shared data directory. This issue could allow attackers to decrypt user passwords and SQL connection strings.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sage:sage_300:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:23

Type Values Removed Values Added
References () https://www.sage.com/en-ca/products/sage-300/ - Product () https://www.sage.com/en-ca/products/sage-300/ - Product

05 May 2023, 18:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-798
References (MISC) https://www.sage.com/en-ca/products/sage-300/ - (MISC) https://www.sage.com/en-ca/products/sage-300/ - Product
CPE cpe:2.3:a:sage:sage_300:*:*:*:*:*:*:*:*

28 Apr 2023, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-28 13:15

Updated : 2024-11-21 07:23


NVD link : CVE-2022-41400

Mitre link : CVE-2022-41400

CVE.ORG link : CVE-2022-41400


JSON object : View

Products Affected

sage

  • sage_300
CWE
CWE-798

Use of Hard-coded Credentials