CVE-2023-22791 (GCVE-0-2023-22791)

Vulnerability from cvelistv5 – Published: 2023-05-08 14:10 – Updated: 2025-01-31 18:01
VLAI?
Summary
A vulnerability exists in Aruba InstantOS and ArubaOS 10 where an edge-case combination of network configuration, a specific WLAN environment and an attacker already possessing valid user credentials on that WLAN can lead to sensitive information being disclosed via the WLAN. The scenarios in which this disclosure of potentially sensitive information can occur are complex and depend on factors that are beyond the control of the attacker.
CWE
  • n/a
Assigner
hpe
Impacted products
Vendor Product Version
Hewlett Packard Enterprise (HPE) Aruba Access Points running InstantOS and ArubaOS 10 Affected: Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below
Affected: Aruba InstantOS 6.5.x: 6.5.4.23 and below
Affected: Aruba InstantOS 8.6.x: 8.6.0.19 and below
Affected: Aruba InstantOS 8.10.x: 8.10.0.4 and below
Affected: ArubaOS 10.3.x: 10.3.1.0 and below
Affected: See reference document for further details
Create a notification for this product.
Credits
Zack Colgan of ClearBearing
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:20:30.672Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-006.txt"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-22791",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-31T18:01:08.113216Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-31T18:01:49.709Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "Aruba Access Points running InstantOS and ArubaOS 10",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "status": "affected",
              "version": "Aruba InstantOS 6.4.x:  6.4.4.8-4.2.4.20 and below"
            },
            {
              "status": "affected",
              "version": "Aruba InstantOS 6.5.x:  6.5.4.23 and below"
            },
            {
              "status": "affected",
              "version": "Aruba InstantOS 8.6.x:  8.6.0.19 and below"
            },
            {
              "status": "affected",
              "version": "Aruba InstantOS 8.10.x: 8.10.0.4 and below"
            },
            {
              "status": "affected",
              "version": "ArubaOS 10.3.x:         10.3.1.0 and below"
            },
            {
              "status": "affected",
              "version": "See reference document for further details"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Zack Colgan of ClearBearing"
        }
      ],
      "datePublic": "2023-05-09T20:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A vulnerability exists in Aruba InstantOS and ArubaOS 10\u0026nbsp;where an edge-case combination of network configuration, a\u0026nbsp;specific WLAN environment and an attacker already possessing\u0026nbsp;valid user credentials on that WLAN can lead to sensitive\u0026nbsp;information being disclosed via the WLAN. The scenarios in\u0026nbsp;which this disclosure of potentially sensitive information\u0026nbsp;can occur are complex and depend on factors that are beyond\u0026nbsp;the control of the attacker."
            }
          ],
          "value": "A vulnerability exists in Aruba InstantOS and ArubaOS 10\u00a0where an edge-case combination of network configuration, a\u00a0specific WLAN environment and an attacker already possessing\u00a0valid user credentials on that WLAN can lead to sensitive\u00a0information being disclosed via the WLAN. The scenarios in\u00a0which this disclosure of potentially sensitive information\u00a0can occur are complex and depend on factors that are beyond\u00a0the control of the attacker."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-08T14:10:03.684Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-006.txt"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Aruba InstantOS and ArubaOS 10 Sensitive Information Disclosure",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2023-22791",
    "datePublished": "2023-05-08T14:10:03.684Z",
    "dateReserved": "2023-01-06T15:24:20.511Z",
    "dateUpdated": "2025-01-31T18:01:49.709Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.3.0.0\", \"versionEndIncluding\": \"10.3.1.0\", \"matchCriteriaId\": \"E9226A2A-7048-4300-AC20-7629AA05E9D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.4.0.0\", \"versionEndIncluding\": \"6.4.4.8-4.2.4.20\", \"matchCriteriaId\": \"93F7D378-2A4F-4A5B-BF1D-3AF38B61C626\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.5.0.0\", \"versionEndIncluding\": \"6.5.4.23\", \"matchCriteriaId\": \"286BD7C8-D7AB-4DEB-AF86-08E246230A50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.4.0.0\", \"versionEndExcluding\": \"8.6.0.0\", \"matchCriteriaId\": \"4F892CBE-3BFF-49F6-9101-171C5A4C1503\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.6.0.0\", \"versionEndIncluding\": \"8.6.0.19\", \"matchCriteriaId\": \"7D7E179A-F8E7-49E3-9049-FE8AD39EB0DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.7.0.0\", \"versionEndIncluding\": \"8.9.0.0\", \"matchCriteriaId\": \"C3A8FE10-DA46-43BF-9713-A844CC935AD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.10.0.0\", \"versionEndIncluding\": \"8.10.0.4\", \"matchCriteriaId\": \"B1F4CC3E-1DBE-405D-869D-21499960C11B\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability exists in Aruba InstantOS and ArubaOS 10\\u00a0where an edge-case combination of network configuration, a\\u00a0specific WLAN environment and an attacker already possessing\\u00a0valid user credentials on that WLAN can lead to sensitive\\u00a0information being disclosed via the WLAN. The scenarios in\\u00a0which this disclosure of potentially sensitive information\\u00a0can occur are complex and depend on factors that are beyond\\u00a0the control of the attacker.\"}]",
      "id": "CVE-2023-22791",
      "lastModified": "2024-11-21T07:45:26.073",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security-alert@hpe.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 4.2}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 4.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 3.6}]}",
      "published": "2023-05-08T15:15:10.647",
      "references": "[{\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-006.txt\", \"source\": \"security-alert@hpe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-006.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security-alert@hpe.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-22791\",\"sourceIdentifier\":\"security-alert@hpe.com\",\"published\":\"2023-05-08T15:15:10.647\",\"lastModified\":\"2024-11-21T07:45:26.073\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability exists in Aruba InstantOS and ArubaOS 10\u00a0where an edge-case combination of network configuration, a\u00a0specific WLAN environment and an attacker already possessing\u00a0valid user credentials on that WLAN can lead to sensitive\u00a0information being disclosed via the WLAN. The scenarios in\u00a0which this disclosure of potentially sensitive information\u00a0can occur are complex and depend on factors that are beyond\u00a0the control of the attacker.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-alert@hpe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":4.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.3.0.0\",\"versionEndIncluding\":\"10.3.1.0\",\"matchCriteriaId\":\"E9226A2A-7048-4300-AC20-7629AA05E9D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.4.0.0\",\"versionEndIncluding\":\"6.4.4.8-4.2.4.20\",\"matchCriteriaId\":\"93F7D378-2A4F-4A5B-BF1D-3AF38B61C626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.0.0\",\"versionEndIncluding\":\"6.5.4.23\",\"matchCriteriaId\":\"286BD7C8-D7AB-4DEB-AF86-08E246230A50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.4.0.0\",\"versionEndExcluding\":\"8.6.0.0\",\"matchCriteriaId\":\"4F892CBE-3BFF-49F6-9101-171C5A4C1503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.6.0.0\",\"versionEndIncluding\":\"8.6.0.19\",\"matchCriteriaId\":\"7D7E179A-F8E7-49E3-9049-FE8AD39EB0DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.7.0.0\",\"versionEndIncluding\":\"8.9.0.0\",\"matchCriteriaId\":\"C3A8FE10-DA46-43BF-9713-A844CC935AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.10.0.0\",\"versionEndIncluding\":\"8.10.0.4\",\"matchCriteriaId\":\"B1F4CC3E-1DBE-405D-869D-21499960C11B\"}]}]}],\"references\":[{\"url\":\"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-006.txt\",\"source\":\"security-alert@hpe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-006.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-006.txt\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T10:20:30.672Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-22791\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-31T18:01:08.113216Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-31T18:01:43.669Z\"}}], \"cna\": {\"title\": \"Aruba InstantOS and ArubaOS 10 Sensitive Information Disclosure\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Zack Colgan of ClearBearing\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.4, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Hewlett Packard Enterprise (HPE)\", \"product\": \"Aruba Access Points running InstantOS and ArubaOS 10\", \"versions\": [{\"status\": \"affected\", \"version\": \"Aruba InstantOS 6.4.x:  6.4.4.8-4.2.4.20 and below\"}, {\"status\": \"affected\", \"version\": \"Aruba InstantOS 6.5.x:  6.5.4.23 and below\"}, {\"status\": \"affected\", \"version\": \"Aruba InstantOS 8.6.x:  8.6.0.19 and below\"}, {\"status\": \"affected\", \"version\": \"Aruba InstantOS 8.10.x: 8.10.0.4 and below\"}, {\"status\": \"affected\", \"version\": \"ArubaOS 10.3.x:         10.3.1.0 and below\"}, {\"status\": \"affected\", \"version\": \"See reference document for further details\"}], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2023-05-09T20:00:00.000Z\", \"references\": [{\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-006.txt\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability exists in Aruba InstantOS and ArubaOS 10\\u00a0where an edge-case combination of network configuration, a\\u00a0specific WLAN environment and an attacker already possessing\\u00a0valid user credentials on that WLAN can lead to sensitive\\u00a0information being disclosed via the WLAN. The scenarios in\\u00a0which this disclosure of potentially sensitive information\\u00a0can occur are complex and depend on factors that are beyond\\u00a0the control of the attacker.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"A vulnerability exists in Aruba InstantOS and ArubaOS 10\u0026nbsp;where an edge-case combination of network configuration, a\u0026nbsp;specific WLAN environment and an attacker already possessing\u0026nbsp;valid user credentials on that WLAN can lead to sensitive\u0026nbsp;information being disclosed via the WLAN. The scenarios in\u0026nbsp;which this disclosure of potentially sensitive information\u0026nbsp;can occur are complex and depend on factors that are beyond\u0026nbsp;the control of the attacker.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"eb103674-0d28-4225-80f8-39fb86215de0\", \"shortName\": \"hpe\", \"dateUpdated\": \"2023-05-08T14:10:03.684Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-22791\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-31T18:01:49.709Z\", \"dateReserved\": \"2023-01-06T15:24:20.511Z\", \"assignerOrgId\": \"eb103674-0d28-4225-80f8-39fb86215de0\", \"datePublished\": \"2023-05-08T14:10:03.684Z\", \"assignerShortName\": \"hpe\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…