{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T21:44:06.937","vulnerabilities":[{"cve":{"id":"CVE-2023-7248","sourceIdentifier":"security@opentext.com","published":"2024-03-15T20:15:07.280","lastModified":"2024-11-21T08:45:36.437","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"\nCertain functionality in OpenText Vertica Management console might be prone to bypass via crafted requests. \n\nThe vulnerability would affect one of Vertica’s authentication functionalities by allowing specially crafted requests and sequences. \nThis issue impacts the following Vertica Management Console versions:\n10.x\n11.1.1-24 or lower\n12.0.4-18 or lower\n\nPlease upgrade to one of the following Vertica Management Console versions:\n10.x to upgrade to latest versions from below.\n11.1.1-25\n12.0.4-19\n23.x\n24.x\n\n"},{"lang":"es","value":"Ciertas funciones en la consola de OpenText Vertica Management pueden ser propensas a omitirse mediante solicitudes manipuladas. La vulnerabilidad afectaría una de las funcionalidades de autenticación de Vertica al permitir solicitudes y secuencias especialmente manipuladas. Este problema afecta las siguientes versiones de Vertica Management Console: 10.x 11.1.1-24 o anterior 12.0.4-18 o anterior Actualice a una de las siguientes versiones de Vertica Management Console: 10.x para actualizar a las últimas versiones desde abajo. 11.1.1-25 12.0.4-19 23.x 24.x"}],"metrics":{"cvssMetricV31":[{"source":"security@opentext.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L","baseScore":5.0,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.8,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@opentext.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:opentext:vertica:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0-0","versionEndIncluding":"10.1.1-26","matchCriteriaId":"056D6A40-95C6-4FEA-91C9-B5C41AE254C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:opentext:vertica:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0-0","versionEndExcluding":"11.1.1-25","matchCriteriaId":"C15386AE-A142-4A50-9B64-276C2FC3E959"},{"vulnerable":true,"criteria":"cpe:2.3:a:opentext:vertica:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0-0","versionEndExcluding":"12.0.4-19","matchCriteriaId":"84FC2248-AAC2-4994-BBB3-6705EAB9934B"}]}]}],"references":[{"url":"https://portal.microfocus.com/s/article/KM000027542?language=en_US","source":"security@opentext.com","tags":["Vendor Advisory"]},{"url":"https://portal.microfocus.com/s/article/KM000027542?language=en_US","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}