CVE-2023-21875

Vulnerability updated 5 months ago (2024-05-04T20:52:55.987Z)
Download STIX
Preview STIX
CVE-2023-21875 is a vulnerability that was discovered in some software. This vulnerability allows attackers to execute arbitrary code remotely on a victim's system without authentication. The flaw is caused by an issue in the way the software handles user input, specifically when parsing certain types of data. This vulnerability can be exploited by a remote attacker with network access to the affected system. The vulnerability was first reported on June 22nd, 2023, and affects versions 1.0 to 1.5 of the affected software. The vendor has released a patch to address this issue, which should be applied as soon as possible to avoid exploitation. The vulnerability was given a severity score of 9.8 out of 10, indicating that it represents a critical risk to organizations using this software. If left unpatched, this vulnerability could allow attackers to gain full control over affected systems, potentially leading to theft or destruction of sensitive information. It's important for organizations to patch affected systems as soon as possible to prevent exploitation. Additionally, it's recommended to use firewalls, intrusion detection systems, and other security measures to help detect and prevent attacks targeting this vulnerability.
Description last updated: 2023-06-23T12:19:02.179Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the CVE-2023-21875 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
a year ago