We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-35833



Assignermitre
Reserved2023-06-18
Published2023-07-13
Updated2024-10-30

Description

An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration.

References

https://ysoft.com

https://www.ysoft.com/en/legal/ldaps-encryption-downgrade-attack-vulnerability

cve.org CVE-2023-35833

nvd.nist.gov CVE-2023-35833

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.