Vulnerability Details : CVE-2023-41927
The server supports at least one cipher suite which is on the NCSC-NL list of cipher suites to be phased out, increasing the risk of cryptographic weaknesses.
Published
2024-07-02 07:43:26
Updated
2024-07-02 12:09:17
Products affected by CVE-2023-41927
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-41927
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 4 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-41927
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
1.6
|
3.6
|
National Cyber Security Centre Netherlands (NCSC-NL) | 2024-07-02 |
5.3
|
MEDIUM | CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
N/A
|
N/A
|
National Cyber Security Centre Netherlands (NCSC-NL) | 2024-07-02 |
CWE ids for CVE-2023-41927
-
The product uses a broken or risky cryptographic algorithm or protocol.Assigned by:
- cert@ncsc.nl (Secondary)
- cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39 (Primary)
References for CVE-2023-41927
-
https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273
NCSC Advisories
Jump to