CVE-2023-31069
Critical
|9.8No Exploit
Plain English Summary
AI-powered analysis for quick understanding
An attacker can easily access sensitive login credentials because they are stored in plain text within the HTML code of the TSplus Remote Access login page. This vulnerability can be exploited simply by viewing the page's source code, making it critical for anyone using this software to take immediate action to secure their systems.
Technical Description
An issue was discovered in TSplus Remote Access through 16.0.2.14. Credentials are stored as cleartext within the HTML source code of the login page.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade FPatched in 904 days
Quick Information
Published
Sep 11, 2023
over 2 years ago
Last Modified
Mar 3, 2026
about 1 month ago
Vendor
tsplus
Product
tsplus remote work