A non-feature complete authentication mechanism exists in the production application allowing an attacker to bypass all authentication checks if LDAP authentication is selected.An unauthenticated attacker can leverage this vulnerability to log in to the CypberPower PowerPanel Enterprise as an administrator by selecting LDAP authentication from a hidden HTML combo box. Successful exploitation of this vulnerability also requires the attacker to know at least one username on the device, but any password will authenticate successfully.
References
Link | Resource |
---|---|
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html | Vendor Advisory |
Configurations
History
22 Aug 2023, 16:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cyberpower:powerpanel_server:*:*:*:*:enterprise:*:*:* | |
CWE | NVD-CWE-Other | |
First Time |
Cyberpower powerpanel Server
Cyberpower |
|
References | (MISC) https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
14 Aug 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-14 05:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-3266
Mitre link : CVE-2023-3266
CVE.ORG link : CVE-2023-3266
JSON object : View
Products Affected
cyberpower
- powerpanel_server
CWE