CVE-2023-36647

A hard-coded cryptographic private key used to sign JWT authentication tokens in ProLion CryptoSpike 3.0.15P2 allows remote attackers to impersonate arbitrary users and roles in web management and REST API endpoints via crafted JWT tokens.
References
Link Resource
https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36647 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:prolion:cryptospike:3.0.15:p2:*:*:*:*:*:*

History

14 Dec 2023, 00:03

Type Values Removed Values Added
CPE cpe:2.3:a:prolion:cryptospike:3.0.15:p2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Prolion
Prolion cryptospike
CWE CWE-798
References () https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36647 - () https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36647 - Exploit, Third Party Advisory

12 Dec 2023, 13:43

Type Values Removed Values Added
Summary
  • (es) Una clave privada criptográfica codificada utilizada para firmar tokens de autenticación JWT en ProLion CryptoSpike 3.0.15P2 permite a atacantes remotos hacerse pasar por usuarios y roles arbitrarios en la administración web y endpoints de API REST a través de tokens JWT manipulados.

12 Dec 2023, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-12 01:15

Updated : 2023-12-14 00:03


NVD link : CVE-2023-36647

Mitre link : CVE-2023-36647

CVE.ORG link : CVE-2023-36647


JSON object : View

Products Affected

prolion

  • cryptospike
CWE
CWE-798

Use of Hard-coded Credentials