First published: Fri Jul 14 2023(Updated: )
An issue in Archer Platform before v.6.13 fixed in v.6.12.0.6 and v.6.13.0 allows an authenticated attacker to obtain sensitive information via API calls related to data feeds and data publication.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RSA Archer | <6.12.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-32760 is high with a severity value of 6.5.
To fix the vulnerability CVE-2023-32760, update Archer Platform to version 6.12.0.6 or 6.13.0.
The affected software versions of CVE-2023-32760 are Archer Platform up to version 6.12.0.6.
An attacker can exploit CVE-2023-32760 by making API calls related to data feeds and data publication to obtain sensitive information.
Yes, you can find more information about CVE-2023-32760 in the following references: [Link 1](https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/702362) and [Link 2](https://www.archerirm.community/t5/product-advisories/archer-announces-availability-of-archer-release-6-13/ta-p/697821).