Lucene search

K
cve[email protected]CVE-2023-36869
HistoryAug 08, 2023 - 6:15 p.m.

CVE-2023-36869

2023-08-0818:15:14
CWE-79
web.nvd.nist.gov
72
azure
devops
server
spoofing
vulnerability
cve-2023-36869
nvd

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

6.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.2%

Azure DevOps Server Spoofing Vulnerability

Affected configurations

Vulners
NVD
Node
microsoftazure_devops_serverRange1.0.020230601.1
OR
microsoftazure_devops_serverRange2020.1.020230601.3
OR
microsoftazure_devops_serverRange2022.0.020230602.5
OR
microsoftazure_devops_serverRange2019.0.020230721.6
VendorProductVersionCPE
microsoftazure_devops_server*cpe:2.3:a:microsoft:azure_devops_server:*:*:*:*:*:*:*:*
microsoftazure_devops_server*cpe:2.3:a:microsoft:azure_devops_server:*:*:*:*:*:*:*:*
microsoftazure_devops_server*cpe:2.3:a:microsoft:azure_devops_server:*:*:*:*:*:*:*:*
microsoftazure_devops_server*cpe:2.3:a:microsoft:azure_devops_server:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Microsoft",
    "product": "Azure DevOps Server",
    "cpes": [
      "cpe:2.3:o:microsoft:azure_devops_server:2019.1.2:-:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "1.0.0",
        "lessThan": "20230601.1",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Azure DevOps Server 2020.1.2",
    "cpes": [
      "cpe:2.3:o:microsoft:azure_devops_server:2020:-:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "2020.1.0",
        "lessThan": "20230601.3",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Azure DevOps Server 2022.0.1",
    "cpes": [
      "cpe:2.3:o:microsoft:azure_devops_server:2022.0.1:-:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "2022.0.0",
        "lessThan": "20230602.5",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Azure DevOps Server 2019.0.1",
    "cpes": [
      "cpe:2.3:o:microsoft:azure_devops_server:2019.0.1:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "2019.0.0",
        "lessThan": "20230721.6",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  }
]

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

6.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.2%