CVE-2023-3266

A non-feature complete authentication mechanism exists in the production application allowing an attacker to bypass all authentication checks if LDAP authentication is selected.An unauthenticated attacker can leverage this vulnerability to log in to the CypberPower PowerPanel Enterprise as an administrator by selecting LDAP authentication from a hidden HTML combo box. Successful exploitation of this vulnerability also requires the attacker to know at least one username on the device, but any password will authenticate successfully.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cyberpower:powerpanel_server:*:*:*:*:enterprise:*:*:*

History

22 Aug 2023, 16:19

Type Values Removed Values Added
References (MISC) https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html - (MISC) https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE NVD-CWE-Other
First Time Cyberpower
Cyberpower powerpanel Server
CPE cpe:2.3:a:cyberpower:powerpanel_server:*:*:*:*:enterprise:*:*:*

14 Aug 2023, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-14 05:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-3266

Mitre link : CVE-2023-3266

CVE.ORG link : CVE-2023-3266


JSON object : View

Products Affected

cyberpower

  • powerpanel_server
CWE
NVD-CWE-Other CWE-358

Improperly Implemented Security Check for Standard