Security & compliance
Upholding the highest standards to protect your data and ensure trust.

DEVO-2021-0002
Multiple vulnerabilities were fixed in Devolutions Server 2020.3.
Affected Products
2020.2 and earlier
Change Log
Initial Publication - 2021-03-30
High - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
Broken Authentication with Windows domain users (CVE-2021-23923)
Under specific conditions, domain users could authenticate as another user in Devolutions Server when the setting auto create domain users is enabled.
Authenticating as another user could provide access passwords that are normally only available to the other user, such as entries in the user private vault. This vulnerability can’t be used to authenticate to a specific user, the authenticated user is defined by a server side configuration.
Affected Products
CVE(s)
CVE-2021-23923
Remediation and Workarounds
Update to Devolutions 2020.3 or higher.
High - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Broken access control on Password List entry elements (CVE-2021-23921)
Credentials stored in Password List entries do not apply correctly access control rules when used with Remote Desktop Manager.
Affected Products
CVE(s)
CVE-2021-23921
Remediation and Workarounds
Update to Devolutions Server 2020.3 or higher
Medium - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Exposure of sensitive information in diagnostic files (CVE-2021-23924)
Sensitive information including passwords could be unintentionally included in diagnostic files that are used for troubleshooting.
Affected Products
CVE(s)
CVE-2021-23924
Remediation and Workarounds
Update to Devolutions Server 2020.3 or higher
High - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Stored cross-site scripting (XSS) vulnerability in URL for entries of type Document (CVE-2021-23925)
The URLs for entries of type "Document" are not validated properly against javascript code execution.
Affected Products
CVE(s)
CVE-2021-23925
Remediation and Workarounds
Update to Devolutions Server 2020.3 or higher




