Lucene search

K
cvelistTrellixCVELIST:CVE-2023-4400
HistorySep 13, 2023 - 6:53 a.m.

CVE-2023-4400

2023-09-1306:53:11
CWE-256
trellix
www.cve.org
2
skyhigh secure web gateway
password management
vulnerability
configuration files
plain text
authentication information
rest api

CVSS3

6.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

35.2%

A password management vulnerability in Skyhigh Secure Web Gateway (SWG) in main releases 11.x prior to 11.2.14, 10.x prior to 10.2.25 and controlled release 12.x prior to 12.2.1, allows some authentication information stored in configuration files to be extracted through SWG REST API. This was possible due to SWG storing the password in plain text in some configuration files.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Skyhigh Secure Web Gateway (SWG) ",
    "vendor": "Skyhigh Security",
    "versions": [
      {
        "lessThan": "11.2.14",
        "status": "affected",
        "version": "11.x",
        "versionType": "custom"
      },
      {
        "lessThan": "10.2.25",
        "status": "affected",
        "version": "10.x",
        "versionType": "custom"
      },
      {
        "lessThan": "12.2.1",
        "status": "affected",
        "version": "12.x",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

6.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

35.2%

Related for CVELIST:CVE-2023-4400