Vulnerability Details : CVE-2023-6916
Audit records for OpenAPI requests may include sensitive information.
This could lead to unauthorized accesses and privilege escalation.
Vulnerability category: Gain privilege
Products affected by CVE-2023-6916
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-6916
0.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6916
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
Nozomi Networks Inc. | 2024-04-10 |
7.5
|
HIGH | CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/V... |
N/A
|
N/A
|
Nozomi Networks Inc. | 2024-09-20 |
CWE ids for CVE-2023-6916
-
The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor.Assigned by: prodsec@nozominetworks.com (Secondary)
-
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.Assigned by: prodsec@nozominetworks.com (Secondary)
References for CVE-2023-6916
-
https://security.nozominetworks.com/NN-2023:17-01
NN-2023:17-01 - Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 - CVE-2023-6916 | Product Security Incident Response Portal
Jump to