Search for vulnerabilities
Vulnerability details: VCID-gq37-jebb-aaad
Vulnerability ID VCID-gq37-jebb-aaad
Aliases CVE-2023-52892
GHSA-ff7q-6vwh-v9m4
Summary In phpseclib before 1.0.22, 2.x before 2.0.46, and 3.x before 3.0.33, some characters in Subject Alternative Name fields in TLS certificates are incorrectly allowed to have a special meaning in regular expressions (such as a + wildcard), leading to name confusion in X.509 certificate host verification.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00104 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00104 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00128 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00128 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00128 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00128 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00128 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00128 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00128 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.0014 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.0014 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.0014 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
epss 0.00445 https://api.first.org/data/v1/epss?cve=CVE-2023-52892
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-ff7q-6vwh-v9m4
cvssv3.1 7.5 https://github.com/phpseclib/phpseclib
generic_textual HIGH https://github.com/phpseclib/phpseclib
cvssv3.1 7.5 https://github.com/phpseclib/phpseclib/commit/6cd6e8ceab9f2b55c8cd81d2192bf98cbeaf4627
generic_textual HIGH https://github.com/phpseclib/phpseclib/commit/6cd6e8ceab9f2b55c8cd81d2192bf98cbeaf4627
cvssv3.1 7.5 https://github.com/phpseclib/phpseclib/issues/1943
generic_textual HIGH https://github.com/phpseclib/phpseclib/issues/1943
cvssv3.1 7.5 https://github.com/phpseclib/phpseclib/releases/tag/3.0.33
generic_textual HIGH https://github.com/phpseclib/phpseclib/releases/tag/3.0.33
cvssv3.1 7.5 https://github.com/x509-name-testing/name_testing_artifacts
generic_textual HIGH https://github.com/x509-name-testing/name_testing_artifacts
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/phpseclib/phpseclib
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/phpseclib/phpseclib/commit/6cd6e8ceab9f2b55c8cd81d2192bf98cbeaf4627
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/phpseclib/phpseclib/issues/1943
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/phpseclib/phpseclib/releases/tag/3.0.33
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/x509-name-testing/name_testing_artifacts
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.16666
EPSS Score 0.00045
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-06-28T10:43:36.102113+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2023-52892 34.0.0rc4