CVE-2023-4400

EUVD-2023-54263
A password management vulnerability in Skyhigh Secure Web Gateway (SWG) in main releases 11.x prior to 11.2.14, 10.x prior to 10.2.25 and controlled release 12.x prior to 12.2.1, allows some authentication information stored in configuration files to be extracted through SWG REST API. This was possible due to SWG storing the password in plain text in some configuration files.

ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.2 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N
trellixCNA
6.2 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 24%
Affected Products (NVD)
VendorProductVersion
skyhighsecuritysecure_web_gateway
10.0.0 ≤
𝑥
< 10.2.25
skyhighsecuritysecure_web_gateway
11.0.0 ≤
𝑥
< 11.2.14
skyhighsecuritysecure_web_gateway
12.0.0 ≤
𝑥
< 12.2.1
𝑥
= Vulnerable software versions