7.5
CVSSv3

CVE-2023-30367

Published: 26/07/2023 Updated: 04/08/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9

Vulnerability Summary

Multi-Remote Next Generation Connection Manager (mRemoteNG) is free software that enables users to store and manage multi-protocol connection configurations to remotely connect to systems. mRemoteNG configuration files can be stored in an encrypted state on disk. mRemoteNG version <= v1.76.20 and <= 1.77.3-dev loads configuration files in plain text into memory (after decrypting them if necessary) at application start-up, even if no connection has been established yet. This allows malicious users to access contents of configuration files in plain text through a memory dump and thus compromise user credentials when no custom password encryption key has been set. This also bypasses the connection configuration file encryption setting by dumping already decrypted configurations from memory.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mremoteng mremoteng 1.77.3-nb

mremoteng mremoteng 1.77.2-nb

mremoteng mremoteng

Mailing Lists

mRemoteNG version 17731784-NB exploit that extracts sensitive information that is stored in memory in the clear but encrypted at rest ...

Github Repositories

Original PoC for CVE-2023-30367

mRemoteNG &lt;= v17731784-NB Password Dumper (CVE-2023-30367) Multi-Remote Next Generation Connection Manager (mRemoteNG) is free software that enables users to store and manage multi-protocol connection configurations to remotely connect to systems mRemoteNG configuration files can be stored in an encrypted state on disk mRemoteNG version &lt;= v17620 and &l

Github CVE Monitor Automatic monitor github cve using Github Actions Last generated : 2023-11-27 01:54:56409018 CVE Name Description Date CVE-2023-9999 obelia01/CVE-2023-9999 test 2023-08-21T12:02:45Z CVE-2023-5815 codeb0ss/CVE-2023-5815-PoC no description 2023-10-26T22:50:26Z CVE-2023-5601 codeb0ss/CVE-2023-5601-PoC no description 2023-10-19T00:47:06Z CVE-2023-

📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.

PoC in GitHub 2023 CVE-2023-0045 (2023-04-25) The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall The ib_prctl_set &nbsp;function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bi

Github CVE Monitor Automatic monitor github cve using Github Actions Last generated : 2023-11-28 01:55:33286580 CVE Name Description Date CVE-2023-9999 obelia01/CVE-2023-9999 test 2023-08-21T12:02:45Z CVE-2023-5815 codeb0ss/CVE-2023-5815-PoC no description 2023-10-26T22:50:26Z CVE-2023-5601 codeb0ss/CVE-2023-5601-PoC no description 2023-10-19T00:47:06Z CVE-2023-