Vulnerability Description
In Dell Secure Connect Gateway Application and Secure Connect Gateway Appliance (between v5.10.00.00 and v5.18.00.00), a security concern has been identified, where a malicious user with a valid User session may inject malicious content in filters of IP Range Rest API. This issue may potentially lead to unintentional information disclosure from the product database.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dell | Secure Connect Gateway | >= 5.10.00.00, < 5.20.00.00 |
Related Weaknesses (CWE)
References
- https://www.dell.com/support/kbdoc/en-us/000219372/dsa-2023-403-security-update-Vendor Advisory
- https://www.dell.com/support/kbdoc/en-us/000219372/dsa-2023-403-security-update-Vendor Advisory
FAQ
What is CVE-2023-44293?
CVE-2023-44293 is a vulnerability with a CVSS score of 5.4 (MEDIUM). In Dell Secure Connect Gateway Application and Secure Connect Gateway Appliance (between v5.10.00.00 and v5.18.00.00), a security concern has been identified, where a malicious user with a valid User...
How severe is CVE-2023-44293?
CVE-2023-44293 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-44293?
Check the references section above for vendor advisories and patch information. Affected products include: Dell Secure Connect Gateway.