Vulnerability Description
An authentication bypass vulnerability exists in the requestHandlers.js verifyToken functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to authentication bypass. An attacker can send a network request to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Milesight | Milesightvpn | 2.0.2 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1700ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1700ExploitThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1700
FAQ
What is CVE-2023-22844?
CVE-2023-22844 is a vulnerability with a CVSS score of 7.3 (HIGH). An authentication bypass vulnerability exists in the requestHandlers.js verifyToken functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to authentication bypass. An att...
How severe is CVE-2023-22844?
CVE-2023-22844 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-22844?
Check the references section above for vendor advisories and patch information. Affected products include: Milesight Milesightvpn.