Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2023-40052
Analyzed
More InfoOfficial Page
Source-security@progress.com
View Known Exploited Vulnerability (KEV) details
Published At-18 Jan, 2024 | 15:15
Updated At-26 Jan, 2024 | 15:26

This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0 .  An attacker who can produce a malformed web request may cause the crash of a PASOE agent potentially disrupting the thread activities of many web application clients. Multiple of these DoS attacks could lead to the flooding of invalid requests as compared to the server’s remaining ability to process valid requests.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Progress Software Corporation
progress
>>openedge>>Versions from 11.7(inclusive) to 11.7.18(exclusive)
cpe:2.3:a:progress:openedge:*:*:*:*:*:*:*:*
Progress Software Corporation
progress
>>openedge>>Versions from 12.2(inclusive) to 12.2.13(exclusive)
cpe:2.3:a:progress:openedge:*:*:*:*:*:*:*:*
Progress Software Corporation
progress
>>openedge_innovation>>Versions before 12.8.0(exclusive)
cpe:2.3:a:progress:openedge_innovation:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
CWE-119Secondarysecurity@progress.com
CWE ID: CWE-119
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-119
Type: Secondary
Source: security@progress.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://community.progress.com/s/article/Important-Progress-OpenEdge-Product-Alert-for-Progress-Application-Server-for-OpenEdge-PASOE-Denial-of-Service-Vulnerability-in-WEB-Transportsecurity@progress.com
Vendor Advisory
https://www.progress.com/openedgesecurity@progress.com
Product
Hyperlink: https://community.progress.com/s/article/Important-Progress-OpenEdge-Product-Alert-for-Progress-Application-Server-for-OpenEdge-PASOE-Denial-of-Service-Vulnerability-in-WEB-Transport
Source: security@progress.com
Resource:
Vendor Advisory
Hyperlink: https://www.progress.com/openedge
Source: security@progress.com
Resource:
Product
Change History
0Changes found

Details not found