CVE-2023-39379 (GCVE-0-2023-39379)
Vulnerability from cvelistv5 – Published: 2023-08-04 09:43 – Updated: 2024-10-21 19:29
VLAI?
Summary
Fujitsu Software Infrastructure Manager (ISM) stores sensitive information at the product's maintenance data (ismsnap) in cleartext form. As a result, the password for the proxy server that is configured in ISM may be retrieved. Affected products and versions are as follows: Fujitsu Software Infrastructure Manager Advanced Edition V2.8.0.060, Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX V2.8.0.060, and Fujitsu Software Infrastructure Manager Essential Edition V2.8.0.060.
Severity ?
No CVSS data available.
CWE
- Cleartext storage of sensitive information
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Fujitsu Limited | Fujitsu Software Infrastructure Manager Advanced Edition |
Affected:
V2.8.0.060
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:10:20.287Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.ts.fujitsu.com/IndexProdSecurity.asp?lng=en"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN38847224/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-39379",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-21T19:29:16.035409Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-21T19:29:32.915Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Fujitsu Software Infrastructure Manager Advanced Edition",
"vendor": "Fujitsu Limited",
"versions": [
{
"status": "affected",
"version": "V2.8.0.060"
}
]
},
{
"product": "Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX",
"vendor": "Fujitsu Limited",
"versions": [
{
"status": "affected",
"version": "V2.8.0.060"
}
]
},
{
"product": "Fujitsu Software Infrastructure Manager Essential Edition",
"vendor": "Fujitsu Limited",
"versions": [
{
"status": "affected",
"version": "V2.8.0.060"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Fujitsu Software Infrastructure Manager (ISM) stores sensitive information at the product\u0027s maintenance data (ismsnap) in cleartext form. As a result, the password for the proxy server that is configured in ISM may be retrieved. Affected products and versions are as follows: Fujitsu Software Infrastructure Manager Advanced Edition V2.8.0.060, Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX V2.8.0.060, and Fujitsu Software Infrastructure Manager Essential Edition V2.8.0.060.\r\n"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Cleartext storage of sensitive information",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-04T09:43:32.360Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://support.ts.fujitsu.com/IndexProdSecurity.asp?lng=en"
},
{
"url": "https://jvn.jp/en/jp/JVN38847224/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-39379",
"datePublished": "2023-08-04T09:43:32.360Z",
"dateReserved": "2023-07-31T02:14:34.126Z",
"dateUpdated": "2024-10-21T19:29:32.915Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fujitsu:software_infrastructure_manager:2.8.0.060:*:*:*:advanced:-:*:*\", \"matchCriteriaId\": \"EAED8D54-C6FD-45B0-93BB-C2CA9AD9161F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fujitsu:software_infrastructure_manager:2.8.0.060:*:*:*:advanced:primeflex:*:*\", \"matchCriteriaId\": \"46473D49-C265-48D1-B903-DBE760EB16AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fujitsu:software_infrastructure_manager:2.8.0.060:*:*:*:essential:*:*:*\", \"matchCriteriaId\": \"7F48F74F-D51E-4DFA-8636-E239E6A425C9\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Fujitsu Software Infrastructure Manager (ISM) stores sensitive information at the product\u0027s maintenance data (ismsnap) in cleartext form. As a result, the password for the proxy server that is configured in ISM may be retrieved. Affected products and versions are as follows: Fujitsu Software Infrastructure Manager Advanced Edition V2.8.0.060, Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX V2.8.0.060, and Fujitsu Software Infrastructure Manager Essential Edition V2.8.0.060.\\r\\n\"}, {\"lang\": \"es\", \"value\": \"Fujitsu Software Infrastructure Manager (ISM) almacena informaci\\u00f3n sensible en los datos de mantenimiento del producto (ismsnap) en forma de texto claro. Como resultado, la contrase\\u00f1a para el servidor proxy que est\\u00e1 configurado en ISM puede ser recuperada. Los productos y versiones afectados son los siguientes: Fujitsu Software Infrastructure Manager Advanced Edition V2.8.0.060, Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX V2.8.0.060 y Fujitsu Software Infrastructure Manager Essential Edition V2.8.0.060.\"}]",
"id": "CVE-2023-39379",
"lastModified": "2024-11-21T08:15:16.917",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2023-08-04T10:15:09.870",
"references": "[{\"url\": \"https://jvn.jp/en/jp/JVN38847224/\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.ts.fujitsu.com/IndexProdSecurity.asp?lng=en\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Product\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN38847224/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.ts.fujitsu.com/IndexProdSecurity.asp?lng=en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\"]}]",
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-312\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-39379\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2023-08-04T10:15:09.870\",\"lastModified\":\"2024-11-21T08:15:16.917\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Fujitsu Software Infrastructure Manager (ISM) stores sensitive information at the product\u0027s maintenance data (ismsnap) in cleartext form. As a result, the password for the proxy server that is configured in ISM may be retrieved. Affected products and versions are as follows: Fujitsu Software Infrastructure Manager Advanced Edition V2.8.0.060, Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX V2.8.0.060, and Fujitsu Software Infrastructure Manager Essential Edition V2.8.0.060.\\r\\n\"},{\"lang\":\"es\",\"value\":\"Fujitsu Software Infrastructure Manager (ISM) almacena informaci\u00f3n sensible en los datos de mantenimiento del producto (ismsnap) en forma de texto claro. Como resultado, la contrase\u00f1a para el servidor proxy que est\u00e1 configurado en ISM puede ser recuperada. Los productos y versiones afectados son los siguientes: Fujitsu Software Infrastructure Manager Advanced Edition V2.8.0.060, Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX V2.8.0.060 y Fujitsu Software Infrastructure Manager Essential Edition V2.8.0.060.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-312\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fujitsu:software_infrastructure_manager:2.8.0.060:*:*:*:advanced:-:*:*\",\"matchCriteriaId\":\"EAED8D54-C6FD-45B0-93BB-C2CA9AD9161F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fujitsu:software_infrastructure_manager:2.8.0.060:*:*:*:advanced:primeflex:*:*\",\"matchCriteriaId\":\"46473D49-C265-48D1-B903-DBE760EB16AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fujitsu:software_infrastructure_manager:2.8.0.060:*:*:*:essential:*:*:*\",\"matchCriteriaId\":\"7F48F74F-D51E-4DFA-8636-E239E6A425C9\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/jp/JVN38847224/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.ts.fujitsu.com/IndexProdSecurity.asp?lng=en\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Product\"]},{\"url\":\"https://jvn.jp/en/jp/JVN38847224/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.ts.fujitsu.com/IndexProdSecurity.asp?lng=en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.ts.fujitsu.com/IndexProdSecurity.asp?lng=en\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN38847224/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T18:10:20.287Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-39379\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-21T19:29:16.035409Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-21T19:29:27.195Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Fujitsu Limited\", \"product\": \"Fujitsu Software Infrastructure Manager Advanced Edition\", \"versions\": [{\"status\": \"affected\", \"version\": \"V2.8.0.060\"}]}, {\"vendor\": \"Fujitsu Limited\", \"product\": \"Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX\", \"versions\": [{\"status\": \"affected\", \"version\": \"V2.8.0.060\"}]}, {\"vendor\": \"Fujitsu Limited\", \"product\": \"Fujitsu Software Infrastructure Manager Essential Edition\", \"versions\": [{\"status\": \"affected\", \"version\": \"V2.8.0.060\"}]}], \"references\": [{\"url\": \"https://support.ts.fujitsu.com/IndexProdSecurity.asp?lng=en\"}, {\"url\": \"https://jvn.jp/en/jp/JVN38847224/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Fujitsu Software Infrastructure Manager (ISM) stores sensitive information at the product\u0027s maintenance data (ismsnap) in cleartext form. As a result, the password for the proxy server that is configured in ISM may be retrieved. Affected products and versions are as follows: Fujitsu Software Infrastructure Manager Advanced Edition V2.8.0.060, Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX V2.8.0.060, and Fujitsu Software Infrastructure Manager Essential Edition V2.8.0.060.\\r\\n\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Cleartext storage of sensitive information\"}]}], \"providerMetadata\": {\"orgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"shortName\": \"jpcert\", \"dateUpdated\": \"2023-08-04T09:43:32.360Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-39379\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-21T19:29:32.915Z\", \"dateReserved\": \"2023-07-31T02:14:34.126Z\", \"assignerOrgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"datePublished\": \"2023-08-04T09:43:32.360Z\", \"assignerShortName\": \"jpcert\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…