A password management vulnerability in Skyhigh Secure Web Gateway (SWG) in main releases 11.x before 11.2.14, 10.x before 10.2.25 and controlled release 12.x before 12.2.1, allows some authentication information stored in configuration files to be extracted through SWG REST API. This was possible due to SWG storing the password in plain text in some configuration files.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
skyhighsecurity secure web gateway |