CVE-2023-4400
CVSS 3.1 Score 6.5 of 10 (medium)
Details
Summary
CVE-2023-4400 is a password management vulnerability found in Skyhigh Secure Web Gateway (SWG) versions 11.x prior to 11.2.14, 10.x prior to 10.2.25, and controlled release 12.x prior to 12.2.1. The vulnerability allows for the extraction of authentication information stored in configuration files through the SWG REST API because the password is stored in plain text in some configuration files. The affected products include taskrZ, taskrY, and t0QpHn. The vulnerability has a base severity of MEDIUM with a base score of 6.5 according to NIST's rating system, posing a high risk to confidentiality. To remediate the vulnerability, users should update their SWG installations to the patched versions specified: 11.2.14, 10.2.25, or 12.2.1 and ensure that sensitive information is not stored in plain text format.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions