CVE-2024-9203

Published at:
2024-09-26T17:15:04.593

Global infos:

A vulnerability, which was classified as problematic, has been found in Enpass Password Manager up to 6.9.5 on Windows. This issue affects some unknown processing. The manipulation leads to cleartext storage of sensitive information in memory. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 6.10.1 is able to address this issue. It is recommended to upgrade the affected component.

CVE Status: Awaiting Analysis

References:

  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • Metrics:

    AttributeValue
    Attack ComplexityHIGH
    Attack VectorLOCAL
    Availability ImpactNONE
    Base Score2.5
    Base SeverityLOW
    Confidentiality ImpactLOW
    Integrity ImpactNONE
    Privileges RequiredLOW
    ScopeUNCHANGED
    User InteractionNONE
    Vector StringCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
    Exploitability Score1
    Impact Score1.4
    Source[email protected]
    TypeSecondary

    Links:

    Exploit-db
    Github