First published: Wed Jun 18 2008(Updated: )
No-IP Dynamic Update Client (DUC) 2.2.1 on Windows uses weak permissions for the HKLM\SOFTWARE\Vitalwerks\DUC registry key, which allows local users to obtain obfuscated passwords and other sensitive information by reading the (1) TrayPassword, (2) Username, (3) Password, and (4) Hosts registry values.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows | ||
No-IP Dynamic Update Client | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2747 is considered a medium severity vulnerability due to the exposure of sensitive information.
To fix CVE-2008-2747, ensure that proper permissions are set for the HKLM\SOFTWARE\Vitalwerks\DUC registry key.
The impacts of CVE-2008-2747 allow local users to access obfuscated passwords and other sensitive information from the registry.
CVE-2008-2747 specifically affects No-IP Dynamic Update Client version 2.2.1 on Windows.
Yes, local users with access to the system can exploit CVE-2008-2747 to read sensitive registry values.