First published: Wed Feb 15 2023(Updated: )
Priority Web version 19.1.0.68, parameter manipulation on an unspecified end-point may allow authentication bypass.
Credit: cna@cyber.gov.il
Affected Software | Affected Version | How to fix |
---|---|---|
Priority Software Priority | =19.1.0.68 |
Update to version 22.1 Web
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23460 is assessed as a medium severity vulnerability due to its potential for authentication bypass.
To mitigate CVE-2023-23460, users should update to a patched version of Priority Web that addresses the parameter manipulation issue.
CVE-2023-23460 can enable attackers to bypass authentication controls, potentially gaining unauthorized access to the system.
CVE-2023-23460 specifically affects Priority Software version 19.1.0.68.
Organizations using Priority Software version 19.1.0.68 should prioritize addressing CVE-2023-23460 to protect against authentication bypass risks.