CVSS 3.1 Score 6.3 of 10 (medium)


Published Mar 1, 2024
CWE ID 264


CVE-2023-47716 is a vulnerability found in IBM CP4BA - Filenet Content Manager Component versions,, and, which could potentially allow a user to gain the privileges of another user under unusual circumstances. The vulnerability has a base severity rating of MEDIUM with a base score of 6.3 according to the Common Vulnerability Scoring System (CVSS) version 3.1. The exploitability score is rated at 2.8, indicating a moderate level of difficulty for attackers to exploit the vulnerability. The impact score is calculated at 3.4, suggesting a relatively low impact on confidentiality, integrity, and availability of the affected system or data. The potential danger this vulnerability poses to an organization is considered moderate, as it allows unauthorized access to privileged user accounts on the network without requiring any user interaction or advanced attack techniques.

To remediate this vulnerability, organizations using IBM CP4BA - Filenet Content Manager Component should apply the latest security patches or updates provided by IBM as soon as they become available. This will help mitigate the risk associated with this vulnerability and protect against potential unauthorized access and privilege escalation attacks.

It is important for organizations to be aware of and address vulnerabilities promptly as they can expose critical systems and sensitive data to potential exploitation by threat actors or malicious entities who may attempt unauthorized access or compromise system integrity for their own gain or malicious purposes.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-47716 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options