Lucene search

K
nvd[email protected]NVD:CVE-2023-32265
HistoryJul 20, 2023 - 2:15 p.m.

CVE-2023-32265

2023-07-2014:15:11
web.nvd.nist.gov
3
vulnerability
escwa
enterprise server
authentication
network access
micro focus directory server
service account

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

28.1%

A potential security vulnerability has been identified in the Enterprise Server Common Web Administration (ESCWA) component used in Enterprise Server, Enterprise Test Server, Enterprise Developer, Visual COBOL, and COBOL Server.
An attacker would need to be authenticated into ESCWA to attempt to exploit this vulnerability. As described in the hardening guide in the product documentation, other mitigations including restricting network access to ESCWA and restricting usersÒ€ℒ permissions in the Micro Focus Directory Server also reduce the exposure to this issue.

Given the right conditions this vulnerability could be exploited to expose a service account password. The account corresponding to the exposed credentials usually has limited privileges and, in many cases would only be useful for extracting details of other user accounts and similar information.

Affected configurations

Nvd
Node
microfocuscobol_serverMatch6.0-
OR
microfocuscobol_serverMatch7.0-
OR
microfocuscobol_serverMatch8.0-
OR
microfocusenterprise_developerMatch6.0-
OR
microfocusenterprise_developerMatch7.0-
OR
microfocusenterprise_developerMatch8.0-
OR
microfocusenterprise_serverMatch6.0-
OR
microfocusenterprise_serverMatch7.0-
OR
microfocusenterprise_serverMatch8.0-
OR
microfocusenterprise_test_serverMatch6.0-
OR
microfocusenterprise_test_serverMatch7.0-
OR
microfocusenterprise_test_serverMatch8.0-
OR
microfocusvisual_cobolMatch6.0-
OR
microfocusvisual_cobolMatch7.0-
OR
microfocusvisual_cobolMatch8.0-
VendorProductVersionCPE
microfocuscobol_server6.0cpe:2.3:a:microfocus:cobol_server:6.0:-:*:*:*:*:*:*
microfocuscobol_server7.0cpe:2.3:a:microfocus:cobol_server:7.0:-:*:*:*:*:*:*
microfocuscobol_server8.0cpe:2.3:a:microfocus:cobol_server:8.0:-:*:*:*:*:*:*
microfocusenterprise_developer6.0cpe:2.3:a:microfocus:enterprise_developer:6.0:-:*:*:*:*:*:*
microfocusenterprise_developer7.0cpe:2.3:a:microfocus:enterprise_developer:7.0:-:*:*:*:*:*:*
microfocusenterprise_developer8.0cpe:2.3:a:microfocus:enterprise_developer:8.0:-:*:*:*:*:*:*
microfocusenterprise_server6.0cpe:2.3:a:microfocus:enterprise_server:6.0:-:*:*:*:*:*:*
microfocusenterprise_server7.0cpe:2.3:a:microfocus:enterprise_server:7.0:-:*:*:*:*:*:*
microfocusenterprise_server8.0cpe:2.3:a:microfocus:enterprise_server:8.0:-:*:*:*:*:*:*
microfocusenterprise_test_server6.0cpe:2.3:a:microfocus:enterprise_test_server:6.0:-:*:*:*:*:*:*
Rows per page:
1-10 of 151

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

28.1%

Related for NVD:CVE-2023-32265