CVE-2023-42183

CVSS 3.1 Score 5.3 of 10 (medium)

Details

Published Dec 15, 2023
Updated: Dec 28, 2023
CWE ID 116

Summary

CVE-2023-42183, also known as lockss-daemon vulnerability, affects the Classic LOCKSS Daemon software versions before 1.77.3. This vulnerability arises from the software's failure to perform post-Unicode normalization, potentially allowing unauthorized access bypass. The affected products include t9y8Y4 and t9y8Y3. To remediate this vulnerability, users should update the lockss-daemon software to version 1.77.3 or later. The potential danger posed by this vulnerability is classified as medium severity, with a base score of 5.3 out of 10, according to NIST's National Vulnerability Database (NVD). The exploitability score is 3.9 out of 10, indicating a moderate level of risk. It is important for organizations using these affected products to apply the necessary patches promptly to mitigate any potential unauthorized access or security breaches that could result from this vulnerability.

Share

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-42183 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options