EmpowerID up to 7.205.0.0 Multi-Factor Authentication Code information disclosure

A vulnerability was found in EmpowerID up to 7.205.0.0. It has been rated as problematic. This issue affects some unknown processing of the component Multi-Factor Authentication Code Handler. The manipulation leads to information disclosure. The CWE definition for the vulnerability is CWE-200. The weakness was presented 08/05/2023. The advisory is shared at seclists.org. The identification of this vulnerability is CVE-2023-4177. Access to the local network is required for this attack. There are no technical details available. There is no exploit available. The price for an exploit might be around USD $0-$5k at the moment. MITRE ATT&CK project uses the attack technique T1592 for this issue. It is declared as not defined. We expect the 0-day to have been worth approximately $0-$5k. Upgrading to version 7.205.0.1 is able to address this issue. It is recommended to upgrade the affected component. A possible mitigation has been published before and not just after the disclosure of the vulnerability. Our investigation indicates that a second CVE-2023-40260 was assigned to this entry.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

122

Field

source_cve_nvd_summary1
source_cve_assigned1
source_cve_duplicate1
exploit_price_0day1
vulnerability_cvss3_meta_tempscore1

Commit Conf

90%27
50%11
70%2
100%1

Approve Conf

90%27
80%11
70%2
100%1
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1466320608/30/2023VulD...cve_nvd_summaryA vulnerability was found in EmpowerID up to 7.205.0.0. It has been rated as problematic. This issue affects some unknown processing of the component Multi-Factor Authentication Code Handler. The manipulation leads to information disclosure. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 7.205.0.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-236213 was assigned to this vulnerability.cve.mitre.org08/30/2023accepted
70
1466320508/30/2023VulD...cve_assigned1691186400 (08/05/2023)cve.mitre.org08/30/2023accepted
70
1458418408/11/2023VulD...cve_duplicateCVE-2023-40260cve.org08/11/2023accepted
100
1454824008/05/2023VulD...price_0day$0-$5ksee exploit price documentation08/05/2023accepted
90
1454823908/05/2023VulD...cvss3_meta_tempscore2.5see CVSS documentation08/05/2023accepted
90
1454823808/05/2023VulD...cvss3_meta_basescore2.6see CVSS documentation08/05/2023accepted
90
1454823708/05/2023VulD...cvss3_vuldb_tempscore2.5see CVSS documentation08/05/2023accepted
90
1454823608/05/2023VulD...cvss3_vuldb_basescore2.6see CVSS documentation08/05/2023accepted
90
1454823508/05/2023VulD...cvss2_vuldb_tempscore1.2see CVSS documentation08/05/2023accepted
90
1454823408/05/2023VulD...cvss2_vuldb_basescore1.4see CVSS documentation08/05/2023accepted
90
1454823308/05/2023VulD...cvss3_vuldb_eXderived from historical data08/05/2023accepted
80
1454823208/05/2023VulD...cvss3_vuldb_avAderived from historical data08/05/2023accepted
80
1454823108/05/2023VulD...cvss2_vuldb_eNDderived from historical data08/05/2023accepted
80
1454823008/05/2023VulD...cvss2_vuldb_auSderived from historical data08/05/2023accepted
80
1454822908/05/2023VulD...cvss2_vuldb_avAderived from historical data08/05/2023accepted
80
1454822808/05/2023VulD...cvss2_vuldb_rlOFderived from vuldb v3 vector08/05/2023accepted
80
1454822708/05/2023VulD...cvss2_vuldb_rcCderived from vuldb v3 vector08/05/2023accepted
80
1454822608/05/2023VulD...cvss2_vuldb_aiNderived from vuldb v3 vector08/05/2023accepted
80
1454822508/05/2023VulD...cvss2_vuldb_iiNderived from vuldb v3 vector08/05/2023accepted
80
1454822408/05/2023VulD...cvss2_vuldb_ciPderived from vuldb v3 vector08/05/2023accepted
80

21 more entries are not shown

Do you need the next level of professionalism?

Upgrade your account now!