NetSaro Enterprise Messenger Server Plaintext Password Storage Vulnerability

Summary
The host is running NetSaro Enterprise Messenger Server and is prone to security bypass vulnerability.
Impact
Successful exploitation could allow local attackers to access the configuration.xml file. Then can decrypt all username and password values and reuse them against other systems within the network. Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaw exists in application because it stores the username and password in plain text format, which allows an attacker to easily decrypt passwords used to authenticate to the application.
Affected
NetSaro Enterprise Messenger Server version 2.0 and prior.
References