First published: Tue Jun 27 2023(Updated: )
A missing authorization check in multiple SOAP endpoints of the Insider Threat Management Server enables an attacker on an adjacent network to read and write unauthorized objects. Successful exploitation requires an attacker to first obtain a valid agent authentication token. All versions before 7.14.3 are affected.
Credit: security@proofpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Proofpoint | <7.14.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-35998 is medium with a severity value of 4.6.
To exploit CVE-2023-35998, an attacker on an adjacent network needs to obtain a valid agent authentication token and perform unauthorized read and write operations on the Insider Threat Management Server.
All versions before 7.14.3 of the Insider Threat Management Server are affected by CVE-2023-35998.
The Common Weakness Enumeration (CWE) ID for CVE-2023-35998 is 862.
You can find more information about CVE-2023-35998 at the following references: [link 1](https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0004) and [link 2](https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-005).