Vulnerability Details : CVE-2023-32260
Misinterpretation of Input vulnerability in OpenText™ Service Management Automation X (SMAX), OpenText™ Asset Management X (AMX), and OpenText™ Hybrid Cloud Management X (HCMX) products. The vulnerability could allow Input data manipulation.This issue affects Service Management Automation X (SMAX) versions: 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11, 2023.05; Asset Management X (AMX) versions: 2021.08, 2021.11, 2022.05, 2022.11, 2023.05; and Hybrid Cloud Management X (HCMX) versions: 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11, 2023.05.
Products affected by CVE-2023-32260
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-32260
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 9 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-32260
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
OpenText | 2024-03-19 |
CWE ids for CVE-2023-32260
-
The product misinterprets an input, whether from an attacker or another product, in a security-relevant fashion.Assigned by: security@opentext.com (Secondary)
References for CVE-2023-32260
-
https://portal.microfocus.com/s/article/KM000018804?language=en_US
Impact of CVE-2023-32260 vulnerability for SMAX, AMX and HCMX
Jump to