Vulnerability Description
An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows sessionid information disclosure via an invalid authentication attempt. This can afterwards be used to bypass the device's authentication and get access to the administrative interface.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Securepoint | Unified Threat Management | >= 12.2.3.1, < 12.2.5.1 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/171924/SecurePoint-UTM-12.x-Session-ID-LeakExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2023/Apr/7ExploitMailing ListThird Party Advisory
- https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22620.txtExploitThird Party Advisory
- https://rcesecurity.comNot Applicable
- http://packetstormsecurity.com/files/171924/SecurePoint-UTM-12.x-Session-ID-LeakExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2023/Apr/7ExploitMailing ListThird Party Advisory
- https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22620.txtExploitThird Party Advisory
- https://rcesecurity.comNot Applicable
FAQ
What is CVE-2023-22620?
CVE-2023-22620 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows sessionid information disclosure via an invalid authentication attempt. This can afterwards be ...
How severe is CVE-2023-22620?
CVE-2023-22620 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-22620?
Check the references section above for vendor advisories and patch information. Affected products include: Securepoint Unified Threat Management.