CVE-2023-22439 (GCVE-0-2023-22439)

Vulnerability from cvelistv5 – Published: 2023-12-18 21:58 – Updated: 2024-08-02 10:07
VLAI?
Summary
Improper input validation of a large HTTP request in the Controller 6000 and Controller 7000 optional diagnostic web interface (Port 80) can be used to perform a Denial of Service of the diagnostic web interface. This issue affects: Gallagher Controller 6000 and 7000 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
Gallagher Controller 6000/ Controller 7000 Affected: 0 , ≤ 8.50 (custom)
Affected: 8.90 , < vCR8.90.231204a (custom)
Affected: 8.80 , < vCR8.80.231204a (custom)
Affected: 8.70 , < vCR8.70.231204a (custom)
Affected: 8.60 , < vCR8.60.231116a (custom)
Create a notification for this product.
Credits
Sebastian Toscano of Amazon Security Kevin Schaller of Amazon Security
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:07:06.573Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-22439"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Controller 6000/ Controller 7000",
          "vendor": "Gallagher",
          "versions": [
            {
              "lessThanOrEqual": "8.50",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "vCR8.90.231204a",
              "status": "affected",
              "version": "8.90",
              "versionType": "custom"
            },
            {
              "lessThan": "vCR8.80.231204a",
              "status": "affected",
              "version": "8.80",
              "versionType": "custom"
            },
            {
              "lessThan": "vCR8.70.231204a",
              "status": "affected",
              "version": "8.70",
              "versionType": "custom"
            },
            {
              "lessThan": "vCR8.60.231116a",
              "status": "affected",
              "version": "8.60",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Sebastian Toscano of Amazon Security"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Kevin Schaller of Amazon Security"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper input validation of a large HTTP request in the Controller 6000 and Controller 7000\u003c/span\u003e\u003cstrong\u003e\u0026nbsp;\u003c/strong\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eoptional\u003c/span\u003e\u003cstrong\u003e\u0026nbsp;\u003c/strong\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ediagnostic web interface (Port 80)\u003c/span\u003e\u003cstrong\u003e\u0026nbsp;\u003c/strong\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ecan be used to perform a Denial of Service of the diagnostic web interface.\u003cbr\u003e\u003cbr\u003eThis issue affects: Gallagher Controller 6000 and 7000 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.\u003c/span\u003e\n\n"
            }
          ],
          "value": "\nImproper input validation of a large HTTP request in the Controller 6000 and Controller 7000\u00a0optional\u00a0diagnostic web interface (Port 80)\u00a0can be used to perform a Denial of Service of the diagnostic web interface.\n\nThis issue affects: Gallagher Controller 6000 and 7000 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-18T21:58:41.026Z",
        "orgId": "0c426f27-3ee1-4eff-be88-288d5a1822bc",
        "shortName": "Gallagher"
      },
      "references": [
        {
          "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-22439"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "0c426f27-3ee1-4eff-be88-288d5a1822bc",
    "assignerShortName": "Gallagher",
    "cveId": "CVE-2023-22439",
    "datePublished": "2023-12-18T21:58:41.026Z",
    "dateReserved": "2023-02-03T20:38:05.234Z",
    "dateUpdated": "2024-08-02T10:07:06.573Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"8.50\", \"matchCriteriaId\": \"3183049E-D5F5-416E-B5B6-140B02510BC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.60\", \"versionEndExcluding\": \"8.60.231116a\", \"matchCriteriaId\": \"162DF4B0-4F15-48D0-9D67-2AD509FD1FAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.70\", \"versionEndExcluding\": \"8.70.231204a\", \"matchCriteriaId\": \"30EEB0FF-D2F2-47DA-9666-6532730B195F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.80\", \"versionEndExcluding\": \"8.80.231204a\", \"matchCriteriaId\": \"D11F6F34-20E1-4BF8-BA36-819F2B153320\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.90\", \"versionEndExcluding\": \"8.90.231204a\", \"matchCriteriaId\": \"715CA029-60DF-422B-90BA-C806DCE041FC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:gallagher:controller_6000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AF2B03B-B033-439F-8CEE-334FA8053278\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"8.50\", \"matchCriteriaId\": \"23C4F969-A44F-40D6-A92B-56A2653A0786\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.60\", \"versionEndExcluding\": \"8.60.231116a\", \"matchCriteriaId\": \"189BCB50-4E9F-4E0B-B03F-D703BD14B6C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.70\", \"versionEndExcluding\": \"8.70.231204a\", \"matchCriteriaId\": \"63286868-84A7-492C-8F48-E0FB883C5666\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.80\", \"versionEndExcluding\": \"8.80.231204a\", \"matchCriteriaId\": \"48DE400E-2C3D-485C-8C8E-DA79BC155E7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.90\", \"versionEndExcluding\": \"8.90.231204a\", \"matchCriteriaId\": \"14A61AE2-E3D1-4BEE-B5E1-361E6E0A617E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:gallagher:controller_6000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AF2B03B-B033-439F-8CEE-334FA8053278\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:gallagher:controller_7000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0F7F6A6-8F69-45C1-A59D-D9FB3FD0C1C7\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"\\nImproper input validation of a large HTTP request in the Controller 6000 and Controller 7000\\u00a0optional\\u00a0diagnostic web interface (Port 80)\\u00a0can be used to perform a Denial of Service of the diagnostic web interface.\\n\\nThis issue affects: Gallagher Controller 6000 and 7000 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Se puede utilizar una validaci\\u00f3n de entrada incorrecta de una solicitud HTTP grande en la interfaz web de diagn\\u00f3stico opcional de Controller 6000 y Controller 7000 (puerto 80) para realizar una denegaci\\u00f3n de servicio de la interfaz web de diagn\\u00f3stico. Este problema afecta a: \\nGallagher Controller 6000 y 7000 8.90 antes de vCR8.90.231204a (distribuido en 8.90.1620 (MR2)), \\n8.80 antes de vCR8.80.231204a (distribuido en 8.80.1369 (MR3)), \\n8.70 antes de vCR8. 70.231204a (distribuido en 8.70.2375 (MR5)), \\n8.60 antes de vCR8.60.231116a (distribuido en 8.60.2550 (MR7)), \\ntodas las versiones de 8.50 y anteriores.\"}]",
      "id": "CVE-2023-22439",
      "lastModified": "2024-11-21T07:44:48.323",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"disclosures@gallagher.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L\", \"baseScore\": 3.1, \"baseSeverity\": \"LOW\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 1.4}]}",
      "published": "2023-12-18T22:15:07.807",
      "references": "[{\"url\": \"https://security.gallagher.com/Security-Advisories/CVE-2023-22439\", \"source\": \"disclosures@gallagher.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.gallagher.com/Security-Advisories/CVE-2023-22439\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "disclosures@gallagher.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"disclosures@gallagher.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-22439\",\"sourceIdentifier\":\"disclosures@gallagher.com\",\"published\":\"2023-12-18T22:15:07.807\",\"lastModified\":\"2024-11-21T07:44:48.323\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nImproper input validation of a large HTTP request in the Controller 6000 and Controller 7000\u00a0optional\u00a0diagnostic web interface (Port 80)\u00a0can be used to perform a Denial of Service of the diagnostic web interface.\\n\\nThis issue affects: Gallagher Controller 6000 and 7000 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Se puede utilizar una validaci\u00f3n de entrada incorrecta de una solicitud HTTP grande en la interfaz web de diagn\u00f3stico opcional de Controller 6000 y Controller 7000 (puerto 80) para realizar una denegaci\u00f3n de servicio de la interfaz web de diagn\u00f3stico. Este problema afecta a: \\nGallagher Controller 6000 y 7000 8.90 antes de vCR8.90.231204a (distribuido en 8.90.1620 (MR2)), \\n8.80 antes de vCR8.80.231204a (distribuido en 8.80.1369 (MR3)), \\n8.70 antes de vCR8. 70.231204a (distribuido en 8.70.2375 (MR5)), \\n8.60 antes de vCR8.60.231116a (distribuido en 8.60.2550 (MR7)), \\ntodas las versiones de 8.50 y anteriores.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"disclosures@gallagher.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L\",\"baseScore\":3.1,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.6,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"disclosures@gallagher.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.50\",\"matchCriteriaId\":\"3183049E-D5F5-416E-B5B6-140B02510BC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.60\",\"versionEndExcluding\":\"8.60.231116a\",\"matchCriteriaId\":\"162DF4B0-4F15-48D0-9D67-2AD509FD1FAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.70\",\"versionEndExcluding\":\"8.70.231204a\",\"matchCriteriaId\":\"30EEB0FF-D2F2-47DA-9666-6532730B195F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.80\",\"versionEndExcluding\":\"8.80.231204a\",\"matchCriteriaId\":\"D11F6F34-20E1-4BF8-BA36-819F2B153320\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.90\",\"versionEndExcluding\":\"8.90.231204a\",\"matchCriteriaId\":\"715CA029-60DF-422B-90BA-C806DCE041FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gallagher:controller_6000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF2B03B-B033-439F-8CEE-334FA8053278\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.50\",\"matchCriteriaId\":\"23C4F969-A44F-40D6-A92B-56A2653A0786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.60\",\"versionEndExcluding\":\"8.60.231116a\",\"matchCriteriaId\":\"189BCB50-4E9F-4E0B-B03F-D703BD14B6C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.70\",\"versionEndExcluding\":\"8.70.231204a\",\"matchCriteriaId\":\"63286868-84A7-492C-8F48-E0FB883C5666\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.80\",\"versionEndExcluding\":\"8.80.231204a\",\"matchCriteriaId\":\"48DE400E-2C3D-485C-8C8E-DA79BC155E7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.90\",\"versionEndExcluding\":\"8.90.231204a\",\"matchCriteriaId\":\"14A61AE2-E3D1-4BEE-B5E1-361E6E0A617E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gallagher:controller_6000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF2B03B-B033-439F-8CEE-334FA8053278\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gallagher:controller_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0F7F6A6-8F69-45C1-A59D-D9FB3FD0C1C7\"}]}]}],\"references\":[{\"url\":\"https://security.gallagher.com/Security-Advisories/CVE-2023-22439\",\"source\":\"disclosures@gallagher.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gallagher.com/Security-Advisories/CVE-2023-22439\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…