Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-44594 | The optional Web Screens feature for Sage 300 through version 2022 uses a hard-coded 40-byte blowfish key ("PASS_KEY") to encrypt and decrypt the database connection string for the PORTAL database found in the "dbconfig.xml". This issue could allow attackers to obtain access to the SQL database. |
| Link | Providers |
|---|---|
| https://www.sage.com/en-ca/products/sage-300/ |
|
Fri, 31 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-31T16:45:01.913Z
Reserved: 2022-09-26T00:00:00.000Z
Link: CVE-2022-41399
Updated: 2024-08-03T12:42:46.396Z
Status : Modified
Published: 2023-04-28T13:15:13.510
Modified: 2025-01-31T17:15:09.690
Link: CVE-2022-41399
No data.
OpenCVE Enrichment
No data.
EUVD