CVE-2023-31069

Critical
|9.8
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

An attacker can easily access sensitive login credentials because they are stored in plain text within the HTML code of the TSplus Remote Access login page. This vulnerability can be exploited simply by viewing the page's source code, making it critical for anyone using this software to take immediate action to secure their systems.

Technical Description

An issue was discovered in TSplus Remote Access through 16.0.2.14. Credentials are stored as cleartext within the HTML source code of the login page.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade FPatched in 904 days

Quick Information

Published

Sep 11, 2023

over 2 years ago

Last Modified

Mar 3, 2026

about 1 month ago

Vendor

tsplus

Product

tsplus remote work