Learn about CVE-2017-15366 affecting Thornberry NDoc versions prior to 8.0. Discover how passwords stored in cleartext during installation can lead to unauthorized access and control.
Thornberry NDoc version 8.0 and earlier versions have a vulnerability where default database (Cache) users' passwords are stored in a log file without encryption during client installation on laptops. This flaw can lead to unauthorized access and control over client devices or the NDoc server.
Understanding CVE-2017-15366
Thornberry NDoc version 8.0 and earlier versions are affected by a security issue that exposes passwords in cleartext, potentially granting unauthorized access to client devices and the server.
What is CVE-2017-15366?
Before Thornberry NDoc version 8.0, default database (Cache) users' passwords are stored without encryption in a log file during client installation on laptops. This vulnerability can be exploited to gain complete admin or system control over client devices or the NDoc server.
The Impact of CVE-2017-15366
The vulnerability allows unauthorized individuals to access and control client devices or the NDoc server without the need for physical access once the password is obtained.
Technical Details of CVE-2017-15366
Thornberry NDoc version 8.0 and earlier versions are susceptible to the following:
Vulnerability Description
Passwords of default database (Cache) users are stored in a log file without encryption during client installation on laptops.
Affected Systems and Versions
Exploitation Mechanism
Unauthorized individuals can exploit the exposed passwords to gain full admin or system control over client devices or the NDoc server.
Mitigation and Prevention
To address CVE-2017-15366, consider the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates