Impact
Improper input verification exists in Cybozu Garoon versions 5.0.0 through 6.0.3, allowing an attacker to alter portal settings without proper validation. This capability can lead to configuration changes that may block legitimate users from accessing the product, effectively causing a denial of service.
Affected Systems
Cybozu Garoon users operating on version 5.0.0 to 6.0.3 are affected. The vulnerability applies to all installations of the product within that version range.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity, and the EPSS value of less than 1% suggests a low current exploitation probability. The flaw is not listed in the CISA KEV catalog, meaning no confirmed exploits are documented at this time. The likely attack vector is through the web interface or configuration API that accepts portal setting changes, as the lack of input validation permits unauthorized modifications. The risk is therefore moderate but the chance of real-world exploitation is currently low.
OpenCVE Enrichment