2.2
CVE-2023-23349
- EPSS 0.02%
- Veröffentlicht 22.03.2024 17:15:07
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle vulnerability@kaspersky.com
- CVE-Watchlists
- Unerledigt
Kaspersky has fixed a security issue in Kaspersky Password Manager (KPM) for Windows that allowed a local user to recover the auto-filled credentials from a memory dump when the KPM extension for Google Chrome is used. To exploit the issue, an attacker must trick a user into visiting a login form of a website with the saved credentials, and the KPM extension must autofill these credentials. The attacker must then launch a malware module to steal those specific credentials.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerKaspersky
≫
Produkt
Kaspersky Password Manager for Windows
Default Statusunaffected
Version
*
Version <
24.0.0.427
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.043 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| vulnerability@kaspersky.com | 2.2 | 0.8 | 1.4 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
|
CWE-316 Cleartext Storage of Sensitive Information in Memory
The product stores sensitive information in cleartext in memory.