The functions to fetch e-mail via POP3 or IMAP as well as sending e-mail via SMTP use OpenSSL for static SSL or TLS based communication. As the SSL_get_verify_result() function is not used the certificated is trusted always and it can not be ensured that the certificate satisfies all necessary security requirements. This could allow an attacker to use an invalid certificate to claim to be a trusted host, use expired certificates, or conduct other attacks that could be detected if the certificate is properly validated. This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.
Published 2023-10-16 09:15:12
Updated 2023-10-20 18:30:38
Source OTRS AG
View at NVD,   CVE.org

Products affected by CVE-2023-5422

  • Otrs » Otrs
    Versions from including (>=) 8.0.0 and before (<) 8.0.37
    cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*
  • Otrs » Otrs
    Versions from including (>=) 7.0.0 and before (<) 7.0.47
    cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*
  • Otrs » Otrs » Community Edition
    Versions from including (>=) 6.0.0 and up to, including, (<=) 6.0.34
    cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*

Exploit prediction scoring system (EPSS) score for CVE-2023-5422

0.09%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2023-5422

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
9.1
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
3.9
5.2
NIST
8.7
HIGH CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
2.2
5.8
OTRS AG

CWE ids for CVE-2023-5422

References for CVE-2023-5422

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!