Show plain JSON{"id": "CVE-2024-3543", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "security@progress.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.4, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 0.5}]}, "published": "2024-05-02T14:15:10.573", "references": [{"url": "https://kemptechnologies.com/", "source": "security@progress.com"}, {"url": "https://support.kemptechnologies.com/hc/en-us/articles/25724813518605-ECS-Connection-Manager-Security-Vulnerabilities-CVE-2024-3544-and-CVE-2024-3543", "source": "security@progress.com"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Secondary", "source": "security@progress.com", "description": [{"lang": "en", "value": "CWE-257"}]}], "descriptions": [{"lang": "en", "value": "\nUse of reversible password encryption algorithm allows attackers to decrypt passwords.\u00a0 Sensitive information can be easily unencrypted by the attacker, stolen credentials can be used for arbitrary actions to corrupt the system.\n\n"}, {"lang": "es", "value": "El uso de un algoritmo de cifrado de contrase\u00f1a reversible permite a los atacantes descifrar contrase\u00f1as. El atacante puede descifrar f\u00e1cilmente la informaci\u00f3n confidencial y las credenciales robadas pueden usarse para acciones arbitrarias que corrompan el sistema."}], "lastModified": "2024-05-02T18:00:37.360", "sourceIdentifier": "security@progress.com"}