Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message.
This issue affects SureMDM On-premise: 6.31 and below version
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message. This issue affects SureMDM On-premise: 6.31 and below versionĀ | Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message. This issue affects SureMDM On-premise: 6.31 and below version |

Status: PUBLISHED
Assigner: 42Gears
Published:
Updated: 2025-02-13T17:02:37.670Z
Reserved: 2023-07-25T06:14:06.274Z
Link: CVE-2023-3897

No data.

Status : Modified
Published: 2023-07-25T09:15:11.687
Modified: 2025-02-13T17:16:59.883
Link: CVE-2023-3897

No data.