2.2
CVE-2023-23349
- EPSS 0.01%
- Published 22.03.2024 17:15:07
- Last modified 21.11.2024 07:46:01
- Source vulnerability@kaspersky.com
- Teams watchlist Login
- Open Login
Kaspersky has fixed a security issue in Kaspersky Password Manager (KPM) for Windows that allowed a local user to recover the auto-filled credentials from a memory dump when the KPM extension for Google Chrome is used. To exploit the issue, an attacker must trick a user into visiting a login form of a website with the saved credentials, and the KPM extension must autofill these credentials. The attacker must then launch a malware module to steal those specific credentials.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorKaspersky
≫
Product
Kaspersky Password Manager for Windows
Default Statusunaffected
Version <
24.0.0.427
Version
*
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.01% | 0.015 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
vulnerability@kaspersky.com | 2.2 | 0.8 | 1.4 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
|
CWE-316 Cleartext Storage of Sensitive Information in Memory
The product stores sensitive information in cleartext in memory.