CVE-2023-25848: Published by Esri on Aug 25, 2023, impacting ArcGIS Enterprise Server. Learn about the vulnerability, impact, and mitigation steps.
This CVE record was published by Esri on August 25, 2023, revealing an information disclosure vulnerability in ArcGIS Enterprise Server versions 11.0 and below. The vulnerability could potentially allow a remote, unauthorized attacker to exploit a crafted query resulting in a low severity information disclosure issue.
Understanding CVE-2023-25848
This section delves deeper into the nature of CVE-2023-25848, its impact, technical details, and how organizations can mitigate and prevent exploitation of this vulnerability.
What is CVE-2023-25848?
ArcGIS Enterprise Server versions 11.0 and below are susceptible to an information disclosure vulnerability. An unauthorized attacker could submit a specifically crafted query to the server, potentially leading to the disclosure of a single attribute in a database connection string. It is important to note that no sensitive business data is exposed in this vulnerability.
The Impact of CVE-2023-25848
The impact of this vulnerability is categorized as medium severity according to the CVSS v3.1 base score of 5.3. The confidentiality impact is low, while the attack complexity is considered low as well. The vulnerability, identified with CWE-319, poses a risk related to the cleartext transmission of sensitive information, exposing organizations to potential information disclosure risks.
Technical Details of CVE-2023-25848
This section provides more insight into the vulnerability, affected systems, and how attackers can exploit this issue.
Vulnerability Description
The vulnerability in ArcGIS Enterprise Server allows remote, unauthorized attackers to potentially reveal specific database connection string attributes through a malicious query.
Affected Systems and Versions
The affected versions of ArcGIS Enterprise Server include 10.8.1, 10.9.1, 11.0, and 11.1. Organizations using any of these versions are at risk of information disclosure due to this vulnerability.
Exploitation Mechanism
Attackers can exploit this vulnerability by submitting a carefully crafted query to the server, which could result in the exposure of database connection string attributes.
Mitigation and Prevention
Understanding how to mitigate and prevent the exploitation of CVE-2023-25848 is crucial for organizations to secure their systems and data.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Esri has released an update patch for ArcGIS Server aimed at addressing this information disclosure vulnerability. Organizations are advised to apply this patch as soon as possible to secure their systems and prevent exploitation of CVE-2023-25848.