Lucene search

K
cveMitreCVE-2023-32568
HistoryMay 10, 2023 - 5:15 a.m.

CVE-2023-32568

2023-05-1005:15:11
CWE-78
mitre
web.nvd.nist.gov
17
veritas
infoscale
viom
command injection
security vulnerability
cve-2023-32568

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

42.3%

An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2.800 and 8.x before 8.0.410. The VIOM web application does not validate user-supplied data and appends it to OS commands and internal binaries used by the application. An attacker with root/administrator level privileges can leverage this to read sensitive data stored on the servers, modify data or server configuration, and delete data or application configuration.

Affected configurations

Nvd
Node
veritasinfoscale_operations_managerRange<7.4.2.800
OR
veritasinfoscale_operations_managerRange8.0.08.0.410
VendorProductVersionCPE
veritasinfoscale_operations_manager*cpe:2.3:a:veritas:infoscale_operations_manager:*:*:*:*:*:*:*:*

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

42.3%

Related for CVE-2023-32568