First published: Tue Jun 27 2023(Updated: )
Cloudexplorer-lite is an open source cloud software stack. Weak passwords can be easily guessed and are an easy target for brute force attacks. This can lead to an authentication system failure and compromise system security. Versions of cloudexplorer-lite prior to 1.2.0 did not enforce strong passwords. This vulnerability has been fixed in version 1.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fit2cloud Cloudexplorer Lite | <1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identified by CVE-2023-34240 is weak password enforcement in Cloudexplorer-lite.
The severity of CVE-2023-34240 is critical, with a CVSS score of 9.8.
Weak passwords in Cloudexplorer-lite can be easily guessed and are susceptible to brute force attacks, which can compromise the system's security.
Versions of Cloudexplorer-lite prior to 1.2.0 are affected.
To fix the weak password issue in Cloudexplorer-lite, it is recommended to enforce strong and complex passwords for user authentication.