CVE-2010-3282

low-risk
Published 2020-01-09

389 Directory Server before 1.2.7.1 (aka Red Hat Directory Server 8.2) and HP-UX Directory Server before B.08.10.03, when audit logging is enabled, logs the Directory Manager password (nsslapd-rootpw) in cleartext when changing cn=config:nsslapd-rootpw, which might allow local users to obtain sensitive information by reading the log.

Do I need to act?

-
0.21% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.3/10 Low
LOCAL / LOW complexity

Affected Products (4)

Hp-Ux Directory Server
Redhat Directory Server
Directory Server

Affected Vendors

24
/ 100
low-risk
Severity 13/34 · Low
Exploitability 1/34 · Minimal
Exposure 10/34 · Low