Description Preview
Overview
mRemoteNG is a popular open-source remote connection manager that supports multiple protocols and allows users to store connection configurations securely. The vulnerability (CWE-312: Cleartext Storage of Sensitive Information) affects versions up to v1.76.20 and 1.77.3-dev. When the application starts, it decrypts all stored connection configurations and loads them into memory in plaintext, regardless of whether connections are being used. This creates a security risk as an attacker with sufficient privileges to access the process memory can extract all connection credentials, including usernames, passwords, and other sensitive information. Even when users have enabled configuration file encryption, the data becomes vulnerable once loaded into memory, effectively nullifying the disk encryption protection.
Remediation
Users of mRemoteNG should take the following actions:
- Upgrade to the latest version of mRemoteNG that addresses this vulnerability
- Always use a strong custom encryption key for your configuration files
- Consider implementing additional access controls to limit who can access the system where mRemoteNG is running
- Monitor for unauthorized memory dump attempts on systems running mRemoteNG
- Consider using a password manager with better memory protection instead of storing credentials in mRemoteNG
- If upgrading is not immediately possible, close mRemoteNG when not actively using it to minimize the exposure window
References
- Packet Storm Security Advisory: http://packetstormsecurity.com/files/173829/mRemoteNG-1.77.3.1784-NB-Sensitive-Information-Extraction.html
- GitHub Issue Tracking: https://github.com/mRemoteNG/mRemoteNG/issues/2420
- Proof of Concept Exploit: https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper
- Secuvera Security Advisory: https://www.secuvera.de/advisories/secuvera-SA-2023-01.txt
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing
- Public AdministrationPublic Administration
- Transportation & WarehousingTransportation & Warehousing
- Health Care & Social AssistanceHealth Care & Social Assistance
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- Finance and InsuranceFinance and Insurance
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Retail TradeRetail Trade
- UtilitiesUtilities
- Wholesale TradeWholesale Trade
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- ConstructionConstruction
- Educational ServicesEducational Services
- InformationInformation
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Real Estate Rental & LeasingReal Estate Rental & Leasing