All versions of the TWinSoft Configuration Tool store encrypted passwords as plaintext in memory. An attacker with access to system files could open a file to load the document into memory, including sensitive information associated with document, such as password. The attacker could then obtain the plaintext password by using a memory viewer.
Storing a password in plaintext may result in a system compromise.
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-03 | government resource mitigation third party advisory us government resource |