{"uuid": "a260f746-e5fe-4395-a245-6cfc975d33c2", "vulnerability": {"vulnId": "CVE-2023-22515", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "a260f746-e5fe-4395-a245-6cfc975d33c2"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2023-10-05T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2023-10-05T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2023-10-05T00:00:00Z"}, "scope": {"notes": "KEV entry: Atlassian Confluence Data Center and Server Broken Access Control Vulnerability | Affected: Atlassian / Confluence Data Center and Server | Description: Atlassian Confluence Data Center and Server contains a broken access control vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA. | Due date: 2023-10-13 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html;  https://nvd.nist.gov/vuln/detail/CVE-2023-22515"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": [], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Confluence Data Center and Server", "due_date": "2023-10-13", "date_added": "2023-10-05", "vendorProject": "Atlassian", "vulnerabilityName": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2023-22515", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-22515"}]}
