CVE-2023-46319

Authentication Bypass Using an Alternate Path or Channel (CWE-288)

Published: Oct 23, 2023 / Updated: 13mo ago

010
CVSS 7.5EPSS 0.04%High
CVE info copied to clipboard

WALLIX Bastion 9.x before 9.0.9 and 10.x before 10.0.5 allows unauthenticated access to sensitive information by bypassing access control on a network access administration web interface.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2023-46319. See article

Oct 23, 2023 at 12:06 AM / cve.report
CVE Assignment

NVD published the first details for CVE-2023-46319

Oct 23, 2023 at 12:15 AM
EPSS

EPSS Score was set to: 0.04% (Percentile: 7.2%)

Oct 23, 2023 at 3:24 PM
Static CVE Timeline Graph

Affected Systems

Wallix/bastion
+null more

Patches

www.wallix.com
+null more

Links to Mitre Att&cks

T1083: File and Directory Discovery
+null more

Attack Patterns

CAPEC-127: Directory Indexing
+null more

News

Vigilance.fr - WALLIX Bastion: information disclosure via Administration Web Interface, analyzed on 06/09/2023
An attacker can bypass access restrictions to data of WALLIX Bastion, via Administration Web Interface, in order to read sensitive information. An attacker can therefore bypass access restrictions to data of WALLIX Bastion, via Administration Web Interface, in order to read sensitive information.
NA - CVE-2023-46319 - WALLIX Bastion 9.x before 9.0.9 and 10.x before...
WALLIX Bastion 9.x before 9.0.9 and 10.x before 10.0.5 allows unauthenticated access to sensitive information by bypassing access control on a network access administration web interface.
CVE-2023-46319
High Severity Description WALLIX Bastion 9.x before 9.0.9 and 10.x before 10.0.5 allows unauthenticated access to sensitive information by bypassing access control on a network access administration web interface. Read more at https://www.tenable.com/cve/CVE-2023-46319
CVE-2023-46319 | WALLIX Bastion up to 9.0.8/10.0.4 Network Access Administration Web Interface information disclosure
A vulnerability classified as problematic was found in WALLIX Bastion up to 9.0.8/10.0.4 . Affected by this vulnerability is an unknown functionality of the component Network Access Administration Web Interface . The manipulation leads to information disclosure. This vulnerability is known as CVE-2023-46319 . The attack needs to be approached within the local network. There is no exploit available. It is recommended to upgrade the affected component.
CVE-2023-46319
WALLIX Bastion 9.x before 9.0.9 and 10.x before 10.0.5 allows unauthenticated access to sensitive information by bypassing access control on a network access administration web interface.
See 4 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:None
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI