First published: Fri Jun 16 2023(Updated: )
A broken authentication vulnerability in 4D SAS 4D Server software v17, v18, v19 R7, and earlier allows attackers to send crafted TCP packets containing requests to perform arbitrary actions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
4D Server | =17 | |
4D Server | =18 | |
4D Server | =18-r5 | |
4D Server | =19 | |
4D Server | =19-r7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this broken authentication vulnerability is CVE-2023-30223.
CVE-2023-30223 has a severity score of 7.5 (high).
CVE-2023-30223 affects 4D SAS 4D Server software versions 17, 18, 19 R7 and earlier.
Attackers can exploit CVE-2023-30223 by sending crafted TCP packets containing requests to perform arbitrary actions.
Yes, you can find additional information on CVE-2023-30223 at the following references: [link1](https://packetstormsecurity.com) and [link2](https://www.infigo.is/en/insights/42/information-disclosure-and-broken-authentication-in-4d-sas-4d-server/).