CVE-2023-32260

Misinterpretation of Input (CWE-115)

Published: Mar 19, 2024 / Updated: 8mo ago

010
CVSS 6.5EPSS 0.04%Medium
CVE info copied to clipboard

Misinterpretation of Input vulnerability in OpenText™ Service Management Automation X (SMAX), OpenText™ Asset Management X (AMX), and OpenText™ Hybrid Cloud Management X (HCMX) products. The vulnerability could allow Input data manipulation.This issue affects Service Management Automation X (SMAX) versions: 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11, 2023.05; Asset Management X (AMX) versions: 2021.08, 2021.11, 2022.05, 2022.11, 2023.05; and Hybrid Cloud Management X (HCMX) versions: 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11, 2023.05.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Timeline

CVE Assignment

NVD published the first details for CVE-2023-32260

Mar 19, 2024 at 9:15 AM
CVSS

A CVSS base score of 6.5 has been assigned.

Mar 19, 2024 at 4:20 PM / nvd
First Article

Feedly found the first article mentioning CVE-2023-32260. See article

Mar 19, 2024 at 4:24 PM / National Vulnerability Database
EPSS

EPSS Score was set to: 0.04% (Percentile: 7.3%)

Mar 20, 2024 at 3:14 PM
Static CVE Timeline Graph

Affected Systems

Opentext
+null more

News

CVE-2023-32260
Medium Severity Description Misinterpretation of Input vulnerability in OpenText™ Service Management Automation X (SMAX), OpenText™ Asset Management X (AMX), and OpenText™ Hybrid Cloud Management X (HCMX) products. The vulnerability could allow Input data manipulation.This issue affects Service Management Automation X (SMAX) versions: 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11, 2023.05; Asset Management X (AMX) versions: 2021.08, 2021.11, 2022.05, 2022.11, 2023.05; and Hybrid Cloud Management X (HCMX) versions: 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11, 2023.05. Read more at https://www.tenable.com/cve/CVE-2023-32260
NA - CVE-2023-32260 - Misinterpretation of Input vulnerability in...
Misinterpretation of Input vulnerability in OpenText™ Service Management Automation X (SMAX), OpenText™ Asset Management X (AMX), and OpenText™ Hybrid Cloud Management X (HCMX) products. The...
NA - CVE-2023-32260 - Misinterpretation of Input vulnerability in...
Misinterpretation of Input vulnerability in OpenText™ Service Management Automation X (SMAX), OpenText™ Asset Management X (AMX), and OpenText™ Hybrid Cloud Management X (HCMX) products. The...
CVE-2023-32260 | OpenText Service Management Automation X interpretation input
A vulnerability, which was classified as problematic , was found in OpenText Service Management Automation X, Asset Management X and Hybrid Cloud Management X . This affects an unknown part. The manipulation leads to misinterpretation of input. This vulnerability is uniquely identified as CVE-2023-32260 . It is possible to initiate the attack remotely. There is no exploit available.
OPENTEXT™ SERVICE MANAGEMENT AUTOMATION X (SMAX) ASSET MANAGEMENT X (AMX) HYBRID CLOUD MANAGEMENT X (HCMX) CVE-2023-32260 CVE-2023-32260 A potential Misinterpretation of Input vulnerability has been identified in SMAX, AMX, and HCMX products. Misinterpretation of Input vulnerability in OpenText™ Service Management Automation X (SMAX), OpenText™ Asset Management X (AMX), and OpenText™ Hybrid Cloud Management X (HCMX) products. The vulnerability could allow Input data manipulation.This issue affects Service Management Automation X (SMAX) versions: 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11, 2023.05; Asset Management X (AMX) versions: 2021.08, 2021.11, 2022.05, 2022.11, 2023.05; and Hybrid Cloud Management X (HCMX) versions: 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11, 2023.05. https://www. cve.org/CVERecord?id=CVE-2023- 32260 https:// portal.microfocus.com/s/articl e/KM000018804?language=en_US # OpenText ™ # ServiceManagementAutomationX (SMAX) # AssetManagementX (AMX) # HybridCloudManagementX (HCMX) # CVE_2023_32260 # bot
See 7 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:High
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI