CVE-2023-25818Improper Restriction of Excessive Authentication Attempts in Server

Severity
7.1HIGHNVD
CNA5.3
EPSS
0.1%
top 64.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 27

Description

Nextcloud server is an open source, personal cloud implementation. In affected versions a malicious user could try to reset the password of another user and then brute force the 62^21 combinations for the password reset token. As of commit `704eb3aa` password reset attempts are now throttled. Note that 62^21 combinations would significant compute resources to brute force. None the less it is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. There are no known workarounds fo

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:NExploitability: 2.8 | Impact: 4.2

Affected Packages2 packages

NVDnextcloud/nextcloud_server21.0.021.0.9.10+4
CVEListV5nextcloud/security-advisories>= 24.0.0, < 24.0.10, >= 25.0.0, < 25.0.4+1

Patches

🔴Vulnerability Details

1
CVEList
Missing brute force protection on password reset token in Nextcloud Server2023-03-27
CVE-2023-25818 — Nextcloud Server vulnerability | cvebase