Vulnerability Description
The login REST API in ProLion CryptoSpike 3.0.15P2 (when LDAP or Active Directory is used as the users store) allows a remote blocked user to login and obtain an authentication token by specifying a username with different uppercase/lowercase character combination.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Prolion | Cryptospike | 3.0.15 |
Related Weaknesses (CWE)
References
- https://prolion.com/cryptospike/Product
- https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36655ExploitThird Party Advisory
- https://prolion.com/cryptospike/Product
- https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36655ExploitThird Party Advisory
FAQ
What is CVE-2023-36655?
CVE-2023-36655 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The login REST API in ProLion CryptoSpike 3.0.15P2 (when LDAP or Active Directory is used as the users store) allows a remote blocked user to login and obtain an authentication token by specifying a u...
How severe is CVE-2023-36655?
CVE-2023-36655 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-36655?
Check the references section above for vendor advisories and patch information. Affected products include: Prolion Cryptospike.