CVE-2023-42183

CVSS 3.1 Score 5.3 of 10 (medium)

Details

Published Dec 15, 2023
Updated: Dec 28, 2023
CWE ID 116

Summary

CVE-2023-42183, also known as lockss-daemon vulnerability, affects the Classic LOCKSS Daemon software versions before 1.77.3. This vulnerability arises from the software's failure to perform post-Unicode normalization, potentially allowing unauthorized access bypass. The affected products include t9y8Y4 and t9y8Y3. To remediate this vulnerability, users should update the lockss-daemon software to version 1.77.3 or later. The potential danger posed by this vulnerability is classified as medium severity, with a base score of 5.3 out of 10, according to NIST's National Vulnerability Database (NVD). The exploitability score is 3.9 out of 10, indicating a moderate level of risk. It is important for organizations using these affected products to apply the necessary patches promptly to mitigate any potential unauthorized access or security breaches that could result from this vulnerability.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-42183 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions