We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-30367



Description

Multi-Remote Next Generation Connection Manager (mRemoteNG) is free software that enables users to store and manage multi-protocol connection configurations to remotely connect to systems. mRemoteNG configuration files can be stored in an encrypted state on disk. mRemoteNG version <= v1.76.20 and <= 1.77.3-dev loads configuration files in plain text into memory (after decrypting them if necessary) at application start-up, even if no connection has been established yet. This allows attackers to access contents of configuration files in plain text through a memory dump and thus compromise user credentials when no custom password encryption key has been set. This also bypasses the connection configuration file encryption setting by dumping already decrypted configurations from memory.

Reserved 2023-04-07 | Published 2023-07-26 | Updated 2024-10-23 | Assigner mitre

References

www.secuvera.de/advisories/secuvera-SA-2023-01.txt

github.com/mRemoteNG/mRemoteNG/issues/2420

github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper

packetstormsecurity.com/...itive-Information-Extraction.html

cve.org (CVE-2023-30367)

nvd.nist.gov (CVE-2023-30367)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-30367

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.