Vulnerability Description
Vulnerability in the Oracle Solaris product of Oracle Systems (component: NSSwitch). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.1 Base Score 4.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:L).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oracle | Solaris | 10 |
References
- https://www.oracle.com/security-alerts/cpujan2023.htmlPatchVendor Advisory
- https://www.oracle.com/security-alerts/cpujan2023.htmlPatchVendor Advisory
FAQ
What is CVE-2023-21900?
CVE-2023-21900 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Vulnerability in the Oracle Solaris product of Oracle Systems (component: NSSwitch). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows high privileged att...
How severe is CVE-2023-21900?
CVE-2023-21900 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-21900?
Check the references section above for vendor advisories and patch information. Affected products include: Oracle Solaris.