First published: Tue Feb 28 2023(Updated: )
### Impact Assigning existing users to a different organization is currently possible. It may lead to unintended access: if a user from organization A is accidentally assigned to organization B, they will retain their permissions and therefore might be able to access stuff they should not be allowed to access. ### Patches Update to 3.8.0 ### Workarounds None ### References None ### For more information If you have any questions or comments about this advisory: * Email us at [vantage6@iknl.nl](mailto:vantage6@iknl.nl)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/vantage6 | <3.8.0 | 3.8.0 |
Vantage6 | <3.6.1 | |
Vantage6 | >=3.7.0<=3.7.3 | |
Vantage6 | =3.8.0-rc1 | |
Vantage6 | =3.8.0-rc2 | |
Vantage6 | =3.8.0-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22738 is a vulnerability in vantage6, a privacy-preserving federated learning infrastructure, that allows users to be assigned to unintended organizations, potentially leading to unintended access.
The CVE-2023-22738 vulnerability has a severity score of 6.5, which is considered medium.
The CVE-2023-22738 vulnerability affects Vantage6 versions up to and excluding 3.6.1, versions between 3.7.0 and 3.7.3 (inclusive), and versions 3.8.0-rc1, 3.8.0-rc2, and 3.8.0-rc3.
To fix the CVE-2023-22738 vulnerability, update your vantage6 installation to version 3.7.4 or later.
You can find more information about the CVE-2023-22738 vulnerability in the vantage6 GitHub repository, specifically in the commit 798aca1de142a4eca175ef51112e2235642f4f24 and the security advisory GHSA-vvjv-97j8-94xh.