Products
No-IP Dynamic Update Client (DUC) v3.x
Source
cve@mitre.org
Tags
CVE-2024-40457 details
Published : Sept. 12, 2024, 2:16 p.m.
Last Modified : Sept. 12, 2024, 6:14 p.m.
Last Modified : Sept. 12, 2024, 6:14 p.m.
Description
No-IP Dynamic Update Client (DUC) v3.x uses cleartext credentials that may occur on a command line or in a file. NOTE: the vendor's position is that cleartext in /etc/default/noip-duc is recommended and is the intentional behavior.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9.1 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-313 | Cleartext Storage in a File or on Disk | The product stores sensitive information in cleartext in a file, or on disk. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
Base Score
9.1
Exploitability Score
3.9
Impact Score
5.2
Base Severity
CRITICAL
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
References
This website uses the NVD API, but is not approved or certified by it.