{"uuid": "f4f7742e-bd79-433f-84e2-b92de394958c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27100", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5395", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27100\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper restriction of excessive authentication attempts in the SSHGuard component of Netgate pfSense Plus software v22.05.1 and pfSense CE software v2.6.0 allows attackers to bypass brute force protection mechanisms via crafted web requests.\n\ud83d\udccf Published: 2023-03-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-25T21:10:13.968Z\n\ud83d\udd17 References:\n1. https://docs.netgate.com/downloads/pfSense-SA-23_05.sshguard.asc\n2. https://redmine.pfsense.org/issues/13574\n3. http://packetstormsecurity.com/files/171791/pfsenseCE-2.6.0-Protection-Bypass.html", "creation_timestamp": "2025-02-25T21:28:01.000000Z"}