CVE-2023-26451Use of Insufficiently Random Values in Software Gmbh OX APP Suite

Severity
7.5HIGHNVD
EPSS
0.1%
top 75.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 2

Description

Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service. Authorization codes were predictable for third parties and could be used to intercept and take over the client authorization process. As a result, other users accounts could be compromised. The oAuth Authorization Service is not enabled by default. We have updated the implementation to use sources with sufficient randomness to generate authorization tokens. No publicly

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-rq8q-w9hr-c2fr: Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service2023-08-02
CVEList
CVE-2023-26451: Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service2023-08-02
CVE-2023-26451 — Use of Insufficiently Random Values | cvebase