Vulnerability Details : CVE-2023-22951
Potential exploit
An issue was discovered in TigerGraph Enterprise Free Edition 3.x. It creates an authentication token for internal systems use. This token can be read from the configuration file. Using this token on the REST API provides an attacker with anonymous admin-level privileges on all REST API endpoints.
Products affected by CVE-2023-22951
- cpe:2.3:a:tigergraph:cloud:-:*:*:*:*:*:*:*
- cpe:2.3:a:tigergraph:tigergraph_enterprise:3.7.0:*:*:*:free:-:*:*
- cpe:2.3:a:tigergraph:tigergraph_enterprise:3.7.0:*:*:*:free:docker:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-22951
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 21 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-22951
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-02-07 |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2023-22951
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2023-22951
-
https://dev.tigergraph.com/forum/c/tg-community/announcements/35
Latest TigerGraph Community/Announcements topics - TigerGraphProduct
-
https://neo4j.com/security/cve-2023-22951/
Unsecured Web Credentials - Neo4j Graph Data PlatformExploit;Third Party Advisory
Jump to