CVE-2023-47316

Headwind MDM Web panel 5.22.1 is vulnerable to Incorrect Access Control. The Web panel allows users to gain access to potentially sensitive API calls such as listing users and their data, file management API calls and audit-related API calls.
References
Link Resource
https://boltonshield.com/en/cve/cve-2023-47316/ Exploit Third Party Advisory
https://boltonshield.com/en/cve/cve-2023-47316/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:h-mdm:headwind_mdm:5.22.1:*:*:*:*:*:*:*

History

21 Nov 2024, 08:30

Type Values Removed Values Added
References () https://boltonshield.com/en/cve/cve-2023-47316/ - Exploit, Third Party Advisory () https://boltonshield.com/en/cve/cve-2023-47316/ - Exploit, Third Party Advisory

30 Nov 2023, 05:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:h-mdm:headwind_mdm:5.22.1:*:*:*:*:*:*:*
References () https://boltonshield.com/en/cve/cve-2023-47316/ - () https://boltonshield.com/en/cve/cve-2023-47316/ - Exploit, Third Party Advisory
CWE CWE-639
First Time H-mdm
H-mdm headwind Mdm

22 Nov 2023, 17:31

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-22 17:15

Updated : 2024-11-21 08:30


NVD link : CVE-2023-47316

Mitre link : CVE-2023-47316

CVE.ORG link : CVE-2023-47316


JSON object : View

Products Affected

h-mdm

  • headwind_mdm
CWE
CWE-639

Authorization Bypass Through User-Controlled Key