{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T16:00:36.350","vulnerabilities":[{"cve":{"id":"CVE-2023-40253","sourceIdentifier":"vuln@krcert.or.kr","published":"2023-08-11T06:15:10.673","lastModified":"2024-11-21T08:19:03.860","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Authentication vulnerability in Genians Genian NAC V4.0, Genians Genian NAC V5.0, Genians Genian NAC Suite V5.0, Genians Genian ZTNA allows Authentication Abuse.This issue affects Genian NAC V4.0: from V4.0.0 through V4.0.155; Genian NAC V5.0: from V5.0.0 through V5.0.42 (Revision 117460); Genian NAC Suite V5.0: from V5.0.0 through V5.0.54; Genian ZTNA: from V6.0.0 through V6.0.15.\n\n"},{"lang":"es","value":"Vulnerabilidad de autenticación incorrecta en productos de Geanians tales como Genian NAC V4.0, Genian NAC V5.0, Genian NAC Suite V5.0, Genian ZTNA permite el abuso de autenticación. Este problema afecta a \nGenian NAC V4. 0: desde V4.0.0 hasta V4.0.155; \nGenian NAC V5.0: desde V5.0.0 hasta V5.0.42 (Revisión 117460);\nGenian NAC Suite V5.0: desde V5.0.0 hasta V5.0.54; \nGenian ZTNA: desde V6.0.0 hasta V6.0.15."}],"metrics":{"cvssMetricV31":[{"source":"vuln@krcert.or.kr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N","baseScore":6.0,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.5,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"vuln@krcert.or.kr","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:genians:genian_nac:*:*:*:*:-:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.0.156","matchCriteriaId":"BE039840-D93C-49CA-BB6A-B70771196C1B"},{"vulnerable":true,"criteria":"cpe:2.3:a:genians:genian_nac:*:*:*:*:-:*:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.0.55","matchCriteriaId":"04EF7B43-ADE3-474E-8E9F-7B2AD27FAB0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:genians:genian_nac:5.0.42:-:*:*:lts:*:*:*","matchCriteriaId":"E514BF16-6FE5-4029-BBFB-87A487C5BC07"},{"vulnerable":true,"criteria":"cpe:2.3:a:genians:genian_nac:5.0.42:revision_117460:*:*:lts:*:*:*","matchCriteriaId":"0A8D2C71-F0A1-41D4-9A84-EAE0CBC39B22"},{"vulnerable":true,"criteria":"cpe:2.3:a:genians:genian_ztna:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.0.16","matchCriteriaId":"A36D6C47-C07E-41F3-9051-47CE254B01D0"}]}]}],"references":[{"url":"https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html","source":"vuln@krcert.or.kr"},{"url":"https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}