Description
A non-feature complete authentication mechanism exists in the production application allowing an attacker to bypass all authentication checks if LDAP authentication is selected.An unauthenticated attacker can leverage this vulnerability to log in to the CypberPower PowerPanel Enterprise as an administrator by selecting LDAP authentication from a hidden HTML combo box. Successful exploitation of this vulnerability also requires the attacker to know at least one username on the device, but any password will authenticate successfully.
Published: 2023-08-14
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-43942 A non-feature complete authentication mechanism exists in the production application allowing an attacker to bypass all authentication checks if LDAP authentication is selected.An unauthenticated attacker can leverage this vulnerability to log in to the CypberPower PowerPanel Enterprise as an administrator by selecting LDAP authentication from a hidden HTML combo box. Successful exploitation of this vulnerability also requires the attacker to know at least one username on the device, but any password will authenticate successfully.
History

Wed, 09 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cyberpower Powerpanel Server
cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published:

Updated: 2024-10-09T14:38:50.239Z

Reserved: 2023-06-15T06:50:36.714Z

Link: CVE-2023-3266

cve-icon Vulnrichment

Updated: 2024-08-02T06:48:08.588Z

cve-icon NVD

Status : Modified

Published: 2023-08-14T05:15:10.067

Modified: 2024-11-21T08:16:50.107

Link: CVE-2023-3266

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses