CVE-2024-8773

SIMPLE.ERP client is vulnerable to MS SQL protocol downgrade request from a server side, what could lead to an unencrypted communication vulnerable to data interception and modification. This issue affect SIMPLE.ERP from 6.20 to 6.30. Only the 6.30 version received a patch 6.30@a03.9, which make it possible for an administrator to enforce encrypted communication. Versions 6.20 and 6.25 remain unpatched.
CVSS

No CVSS.

Configurations

No configuration.

History

27 Mar 2025, 16:44

Type Values Removed Values Added
Summary
  • (es) El cliente SIMPLE.ERP es vulnerable a solicitudes de degradación del protocolo MS SQL desde el servidor, lo que podría provocar una comunicación sin cifrar, vulnerable a la interceptación y modificación de datos. Este problema afecta a SIMPLE.ERP de la versión 6.20 a la 6.30. Solo la versión 6.30 recibió el parche 6.30@a03.9, que permite al administrador aplicar el cifrado de la comunicación. Las versiones 6.20 y 6.25 siguen sin parchearse.

24 Mar 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-24 13:15

Updated : 2025-03-27 16:44


NVD link : CVE-2024-8773

Mitre link : CVE-2024-8773

CVE.ORG link : CVE-2024-8773


JSON object : View

Products Affected

No product.

CWE
CWE-757

Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')