Vulnerability Description
netbox-docker before 2.5.0 has a superuser account with default credentials (admin password for the admin account, and 0123456789abcdef0123456789abcdef01234567 value for SUPERUSER_API_TOKEN). In practice on the public Internet, almost all users changed the password but only about 90% changed the token. Having a default token value was intentional and was valuable for the main intended use case of the netbox-docker product (isolated development networks). Some users engaged in an effort to repurpose netbox-docker for production. The documentation for this effort stated that the defaults must not be used. However, installation did not ensure non-default values. The Supplier was aware of the CVE ID assignment and did not object to the assignment.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netboxlabs | Netbox-Docker | < 2.5.0 |
Related Weaknesses (CWE)
References
- https://github.com/netbox-community/netbox-docker/issues/953ExploitIssue Tracking
- https://github.com/netbox-community/netbox-docker/pull/959Issue TrackingPatch
- https://github.com/netbox-community/netbox-docker/releases/tag/2.5.0Release Notes
FAQ
What is CVE-2023-27573?
CVE-2023-27573 is a vulnerability with a CVSS score of 9.0 (CRITICAL). netbox-docker before 2.5.0 has a superuser account with default credentials (admin password for the admin account, and 0123456789abcdef0123456789abcdef01234567 value for SUPERUSER_API_TOKEN). In pract...
How severe is CVE-2023-27573?
CVE-2023-27573 has been rated CRITICAL with a CVSS base score of 9.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-27573?
Check the references section above for vendor advisories and patch information. Affected products include: Netboxlabs Netbox-Docker.