Vulnerability Description
Incorrect user role checking in multiple REST API endpoints in ProLion CryptoSpike 3.0.15P2 allows a remote attacker with low privileges to execute privileged functions and achieve privilege escalation via REST API endpoint invocation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Prolion | Cryptospike | 3.0.15 |
Related Weaknesses (CWE)
References
- https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36646ExploitThird Party Advisory
- https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36646ExploitThird Party Advisory
FAQ
What is CVE-2023-36646?
CVE-2023-36646 is a vulnerability with a CVSS score of 8.8 (HIGH). Incorrect user role checking in multiple REST API endpoints in ProLion CryptoSpike 3.0.15P2 allows a remote attacker with low privileges to execute privileged functions and achieve privilege escalatio...
How severe is CVE-2023-36646?
CVE-2023-36646 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-36646?
Check the references section above for vendor advisories and patch information. Affected products include: Prolion Cryptospike.