First published: Tue May 30 2023(Updated: )
An issue was discovered in Faronics Insight 10.0.19045 on Windows. It is possible for a remote attacker to communicate with the private API endpoints exposed at /login, /consoleSettings, /console, etc. despite Virtual Host Routing being used to block this access. Remote attackers can interact with private pages on the web server, enabling them to perform privileged actions such as logging into the console and changing console settings if they have valid credentials.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Faronics Insight | =10.0.19045 | |
Microsoft Windows Operating System | ||
Faronics Insight | =10.0.19045 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28346 has been classified as a moderate severity vulnerability due to its potential for remote exploitation.
To fix CVE-2023-28346, ensure that you apply the latest security updates provided by Faronics for Insight version 10.0.19045.
CVE-2023-28346 allows remote attackers to communicate with sensitive private API endpoints, potentially leading to unauthorized actions on the system.
CVE-2023-28346 specifically affects users of Faronics Insight version 10.0.19045 running on Windows.
Yes, CVE-2023-28346 is exploitable remotely, allowing attackers to access private API endpoints without proper authentication.