Vulnerability Details : CVE-2023-38102
NETGEAR ProSAFE Network Management System createUser Missing Authorization Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the createUser function. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-19726.
Vulnerability category: Gain privilege
Products affected by CVE-2023-38102
- cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-38102
0.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-38102
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
Zero Day Initiative | 2024-05-03 |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | 2025-02-06 |
CWE ids for CVE-2023-38102
-
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.Assigned by: zdi-disclosures@trendmicro.com (Secondary)
References for CVE-2023-38102
-
https://www.zerodayinitiative.com/advisories/ZDI-23-914/
ZDI-23-914 | Zero Day InitiativeThird Party Advisory
-
https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025
Security Advisory for Multiple Vulnerabilities on the ProSAFEĀ® Network Management System, PSV-2023-0024 & PSV-2023-0025 - NETGEAR SupportVendor Advisory
Jump to