Description
An issue was discovered in SecurEnvoy SecurAccess 9.3.502. When put in Debug mode and used for RDP connections, the application stores the emergency credentials in cleartext in the logs (present in the DEBUG folder) that can be accessed by anyone. NOTE: The vendor disputes this as a vulnerability since the disclosure of a local account password (actually an alpha numeric passcode) is achievable only when a custom registry key is added to the windows registry. This action requires administrator access and the registry key is only provided by support staff at securenvoy to troubleshoot customer issues.
References (3)
Core 3
Core References
Third Party Advisory
https://www.excellium-services.com/cert-xlm-advisory/cve-2018-18466/
Various Sources
https://cds.thalesgroup.com/en/tcs-cert/CVE-2018-18466
Various Sources
https://www.excellium-services.com/cert-xlm-advisory
Scores
CVSS v3
7.0
EPSS
0.0013
EPSS Percentile
32.5%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-532
Status
published
Products (1)
securenvoy/securaccess
9.3.502
Published
Mar 21, 2019
Tracked Since
Feb 18, 2026