Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/l00neyhacker/CVE-2023-23130 |
![]() ![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T10:28:39.759Z
Reserved: 2023-01-11T00:00:00
Link: CVE-2023-23130

Updated: 2024-08-02T10:28:39.759Z

Status : Modified
Published: 2023-02-01T14:15:09.777
Modified: 2024-11-21T07:45:52.710
Link: CVE-2023-23130

No data.