{"uuid": "cc24ca35-c67a-413f-b687-3d6108de9c4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-23857", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5733", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-23857\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H)\n\ud83d\udd39 Description: Due to missing authentication check, SAP NetWeaver AS for Java - version 7.50, allows an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and services across systems. On a successful exploitation, the attacker can read and modify some sensitive information but can also be used to lock up any element or operation of the system making that it unresponsive or unavailable.\n\n\n\ud83d\udccf Published: 2023-03-14T04:36:33.138Z\n\ud83d\udccf Modified: 2025-02-27T18:15:53.970Z\n\ud83d\udd17 References:\n1. https://launchpad.support.sap.com/#/notes/3252433\n2. https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", "creation_timestamp": "2025-02-27T18:26:49.000000Z"}