CVE-2023-32260 Vulnerability Details
/
/
/
CVE-2023-32260 Metadata Quick Info
CVE Published: 19/03/2024 |
CVE Updated: 02/08/2024 |
CVE Year: 2023
Source: OpenText |
Vendor: OpenText™ |
Product: Service Management Automation X (SMAX)
Status : PUBLISHED
CVE-2023-32260 Description
Misinterpretation of Input vulnerability in OpenText™ Service Management Automation X (SMAX), OpenText™ Asset Management X (AMX), and OpenText™ Hybrid Cloud Management X (HCMX) products. The vulnerability could allow Input data manipulation.This issue affects Service Management Automation X (SMAX) versions: 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11, 2023.05; Asset Management X (AMX) versions: 2021.08, 2021.11, 2022.05, 2022.11, 2023.05; and Hybrid Cloud Management X (HCMX) versions: 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11, 2023.05.
Metrics
CVSS Version: 3.1 |
Base Score: 6.5 MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
l➤ Exploitability Metrics:
Attack Vector (AV)* NETWORK
Attack Complexity (AC)* LOW
Privileges Required (PR)* LOW
User Interaction (UI)* NONE
Scope (S)* UNCHANGED
l➤ Impact Metrics:
Confidentiality Impact (C)* NONE
Integrity Impact (I)* HIGH
Availability Impact (A)* NONE
Weakness Enumeration (CWE)
CWE-ID: CWE-115
CWE Name: CWE-115 Misinterpretation of Input
Source: OpenText™
Common Attack Pattern Enumeration and Classification (CAPEC)
CAPEC-ID: CAPEC-153
CAPEC Description: CAPEC-153 Input Data Manipulation
Source: NVD (National Vulnerability Database).