// For flags

CVE-2023-32188

JWT token compromise can allow malicious actions including Remote Code Execution (RCE)

Severity Score

9.4
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.

Un usuario puede aplicar ingeniería inversa al token JWT (JSON Web Token) utilizado en la autenticación para el acceso a la API y al administrador, falsificando un token NeuVector válido para realizar una actividad maliciosa en NeuVector. Esto puede dar lugar a una RCE.

*Credits: Dejan Zelic at Offensive Security
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
Low
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
High
High
Integrity
High
High
Availability
High
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-05-04 CVE Reserved
  • 2024-10-16 CVE Published
  • 2024-10-16 CVE Updated
  • 2024-10-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-1270: Generation of Incorrect Security Tokens
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
SUSE
Search vendor "SUSE"
Neuvector
Search vendor "SUSE" for product "Neuvector"
< 0.0.0-20231003121714-be746957ee7c
Search vendor "SUSE" for product "Neuvector" and version " < 0.0.0-20231003121714-be746957ee7c"
en
Affected