CVE-2023-4400 Vulnerability Details

  /     /     /  

CVE-2023-4400 Metadata Quick Info

CVE Published: 13/09/2023 | CVE Updated: 25/09/2024 | CVE Year: 2023
Source: trellix | Vendor: Skyhigh Security | Product: Skyhigh Secure Web Gateway (SWG)
Status : PUBLISHED

CVE-2023-4400 Description

A password management vulnerability in Skyhigh Secure Web Gateway (SWG) in main releases 11.x prior to 11.2.14, 10.x prior to 10.2.25 and controlled release 12.x prior to 12.2.1, allows some authentication information stored in configuration files to be extracted through SWG REST API. This was possible due to SWG storing the password in plain text in some configuration files.

Metrics

CVSS Version: 3.1 | Base Score: 6.2 MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* HIGH
    User Interaction (UI)* REQUIRED
    Scope (S)* CHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* NONE
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-256
CWE Name: CWE-256: Plaintext Storage of a Password
Source: Skyhigh Security

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-37
CAPEC Description: CAPEC-37 Retrieve Embedded Sensitive Data


Source: NVD (National Vulnerability Database).