Vulnerability Details CVE-2023-5240
Improper access control in PAM propagation scripts in Devolutions Server 2023.2.8.0 and ealier allows an attack with permission to manage PAM propagation scripts to retrieve passwords stored in it via a GET request.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 39.9%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2023-5240
-
cpe:2.3:a:devolutions:devolutions_server:-
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.11.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.13.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.14.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.15.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.16.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.17.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.18.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.19.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.20.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.1.9.0
-
cpe:2.3:a:devolutions:devolutions_server:2019.2.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.13.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.3.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.1.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.2.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.2.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.2.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.2.9.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.11.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.14.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.17.0
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.18
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.20
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.21
-
cpe:2.3:a:devolutions:devolutions_server:2020.3.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2021.1
-
cpe:2.3:a:devolutions:devolutions_server:2021.1.17
-
cpe:2.3:a:devolutions:devolutions_server:2021.1.18
-
cpe:2.3:a:devolutions:devolutions_server:2021.1.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.1.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.2.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.10.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.12.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.13.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.2
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.3.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.4.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.5.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.6.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2022.3.9.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.3.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.4.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.5.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.6.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.7.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.1.8.0
-
cpe:2.3:a:devolutions:devolutions_server:2023.2