Vulnerability Description
An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows information disclosure of memory contents to be achieved by an authenticated user. Essentially, uninitialized data can be retrieved via an approach in which a sessionid is obtained but not used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Securepoint | Unified Threat Management | >= 12.2.3.1, < 12.2.5.1 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/171928/SecurePoint-UTM-12.x-Memory-Leak.htmExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2023/Apr/8ExploitMailing ListThird Party Advisory
- https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22897.txtExploitThird Party Advisory
- https://rcesecurity.comNot Applicable
- http://packetstormsecurity.com/files/171928/SecurePoint-UTM-12.x-Memory-Leak.htmExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2023/Apr/8ExploitMailing ListThird Party Advisory
- https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22897.txtExploitThird Party Advisory
- https://rcesecurity.comNot Applicable
FAQ
What is CVE-2023-22897?
CVE-2023-22897 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows information disclosure of memory contents to be achieved by an authenticated user. Essentially,...
How severe is CVE-2023-22897?
CVE-2023-22897 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-22897?
Check the references section above for vendor advisories and patch information. Affected products include: Securepoint Unified Threat Management.