Show plain JSON{"id": "CVE-2023-23632", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2023-10-12T20:15:12.187", "references": [{"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2023_03_CSNC-2022-018_PRA_Privilege_Escalation.txt", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-287"}]}], "descriptions": [{"lang": "en", "value": "BeyondTrust Privileged Remote Access (PRA) versions 22.2.x to 22.4.x are vulnerable to a local authentication bypass. Attackers can exploit a flawed secret verification process in the BYOT shell jump sessions, allowing unauthorized access to jump items by guessing only the first character of the secret."}, {"lang": "es", "value": "Las versiones 22.2.x a 22.4.x de BeyondTrust Privileged Remote Access (PRA) son vulnerables a una omisi\u00f3n de autenticaci\u00f3n local. Los atacantes pueden aprovechar un proceso de verificaci\u00f3n de secretos defectuoso en las sesiones de salto del shell BYOT, lo que permite el acceso no autorizado a elementos de salto adivinando solo el primer car\u00e1cter del secreto."}], "lastModified": "2023-10-18T19:28:11.450", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:beyondtrust:privileged_remote_access:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31A784B4-BF67-4CBC-BD67-688E05CFD037", "versionEndExcluding": "22.3.3", "versionStartIncluding": "22.2.1"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}