Vulnerability Details CVE-2023-5240
Improper access control in PAM propagation scripts in Devolutions Server 2023.2.8.0 and ealier allows an attack with permission to manage PAM propagation scripts to retrieve passwords stored in it via a GET request.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 39.3%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2023-5240
-
cpe:2.3:a:devolutions:devolutions_server:-
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.11.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.13.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.14.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.15.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.16.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.17.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.18.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.19.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.20.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.9.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.2.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.13.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.3.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.2.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.2.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.2.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.2.9.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.11.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.14.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.17.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.18
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.20
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.21
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2021.1
-
cpe:2.3:a:devolutions:devolutions_server:2021.1.17
-
cpe:2.3:a:devolutions:devolutions_server:2021.1.18
-
cpe:2.3:a:devolutions:devolutions_server:2021.1.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.1.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.2.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.2.3.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.0.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.1.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.13.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.2
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.3.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.4.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.5.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.6.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.9.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.0.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.1.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.3.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.4.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.5.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.6.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.2