PatchSiren cyber security CVE debrief
CVE-2023-35067 Infodrom Software CVE debrief
CVE-2023-35067 is a high-severity information disclosure issue in Infodrom E-Invoice Approval System before v20230701. According to the published description, the product stores a password in plaintext, which can allow sensitive strings to be read from an executable. The NVD record rates the issue as network-reachable, no-authentication, no-user-interaction, with high confidentiality impact.
- Vendor
- Infodrom Software
- Product
- E-Invoice Approval System
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-07-25
- Original CVE updated
- 2024-11-21
- Advisory published
- 2023-07-25
- Advisory updated
- 2024-11-21
Who should care
Organizations running Infodrom E-Invoice Approval System, especially deployments still on versions earlier than v20230701. Security teams responsible for application binaries, release artifacts, and secret management should treat this as a credential exposure risk.
Technical summary
The vulnerability is described as plaintext storage of a password that enables read access to sensitive strings within an executable. NVD maps the issue to CVSS 3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating a remote, low-complexity disclosure problem with no integrity or availability impact. NVD also lists CWE-522 and the advisory reference lists CWE-256.
Defensive priority
High for any environment still running affected builds. The issue is easy to reach in principle, has no required privileges or user interaction, and can expose sensitive secrets embedded in software artifacts.
Recommended defensive actions
- Upgrade Infodrom E-Invoice Approval System to v20230701 or later.
- Inventory deployed instances and confirm which hosts still run pre-v20230701 builds.
- Treat any exposed password as compromised and rotate related credentials.
- Review build and packaging processes to ensure secrets are never embedded in executables or release artifacts.
- Scan internal binaries and artifact repositories for plaintext credentials as part of remediation validation.
Evidence notes
This debrief is based only on the supplied NVD CVE record and the linked USOM advisory. The NVD record states the affected range as before v20230701 and provides CVSS 3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The supplied metadata also lists secondary weakness mappings CWE-256 and CWE-522. No KEV entry was supplied.
Official resources
-
CVE-2023-35067 CVE record
CVE.org
-
CVE-2023-35067 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
CVE published 2023-07-25T07:15:10.770Z and last modified 2024-11-21T08:07:54.810Z. The supplied enrichment does not mark this CVE as KEV.