Vulnerability Details : CVE-2023-32217
IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6 allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.
Products affected by CVE-2023-32217
- cpe:2.3:a:sailpoint:identityiq:8.3:-:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.3:patch1:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.2:patch1:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.2:patch2:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.2:patch4:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.2:-:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.1:patch1:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.1:patch2:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.1:patch3:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.1:patch4:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.1:patch5:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.1:-:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.0:patch1:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.0:patch2:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.0:patch3:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.0:patch4:*:*:*:*:*:*
- cpe:2.3:a:sailpoint:identityiq:8.0:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-32217
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-32217
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
9.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H |
2.3
|
6.0
|
SailPoint Technologies |
CWE ids for CVE-2023-32217
-
The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.Assigned by:
- nvd@nist.gov (Primary)
- psirt@sailpoint.com (Secondary)
References for CVE-2023-32217
-
https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/
SailPoint IdentityIQ Unsafe use of Reflection Vulnerability- CVE-2023-32217 | SailPointVendor Advisory
Jump to