9.8
CRITICAL
CVE-2023-28562
"SAP NetWeaver Memory Corruption Vulnerability"
Description

Memory corruption while handling payloads from remote ESL.

INFO

Published Date :

Sept. 5, 2023, 7:15 a.m.

Last Modified :

Nov. 21, 2024, 7:55 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2023-28562 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm aqt1000_firmware
2 Qualcomm qca6391_firmware
3 Qualcomm qca6420_firmware
4 Qualcomm qca6430_firmware
5 Qualcomm sd855_firmware
6 Qualcomm wcd9341_firmware
7 Qualcomm wcd9380_firmware
8 Qualcomm wcd9385_firmware
9 Qualcomm wcn3980_firmware
10 Qualcomm wcn3988_firmware
11 Qualcomm wsa8810_firmware
12 Qualcomm wsa8815_firmware
13 Qualcomm wsa8830_firmware
14 Qualcomm wsa8835_firmware
15 Qualcomm sc8180x\+sdx55_firmware
16 Qualcomm sd460_firmware
17 Qualcomm sd662_firmware
18 Qualcomm sd730_firmware
19 Qualcomm sdx55_firmware
20 Qualcomm sm4125_firmware
21 Qualcomm sm6250_firmware
22 Qualcomm sm6250p_firmware
23 Qualcomm sm7250p_firmware
24 Qualcomm sc8180x-ad_firmware
25 Qualcomm sc8180xp-ad_firmware
26 Qualcomm sc8180x-aa_firmware
27 Qualcomm sc8180x-ab_firmware
28 Qualcomm sc8180xp-ac_firmware
29 Qualcomm sc8180xp-af_firmware
30 Qualcomm sc8180x-ac_firmware
31 Qualcomm sc8180x-af_firmware
32 Qualcomm sc8180xp-aa_firmware
33 Qualcomm sc8180xp-ab_firmware
34 Qualcomm wcd9326_firmware
35 Qualcomm wcd9335_firmware
36 Qualcomm wcd9340_firmware
37 Qualcomm wcd9370_firmware
38 Qualcomm wcd9375_firmware
39 Qualcomm wcn3910_firmware
40 Qualcomm wcn3950_firmware
41 Qualcomm wcn3990_firmware
42 Qualcomm qcs410_firmware
43 Qualcomm qcs610_firmware
44 Qualcomm fastconnect_6200_firmware
45 Qualcomm fastconnect_6800_firmware
46 Qualcomm qcn7606_firmware
47 Qualcomm snapdragon_460_firmware
48 Qualcomm snapdragon_480_5g_firmware
49 Qualcomm snapdragon_480\+_5g_firmware
50 Qualcomm snapdragon_662_firmware
51 Qualcomm snapdragon_675_firmware
52 Qualcomm snapdragon_678_firmware
53 Qualcomm snapdragon_690_5g_firmware
54 Qualcomm snapdragon_695_5g_firmware
55 Qualcomm snapdragon_720g_firmware
56 Qualcomm snapdragon_730_firmware
57 Qualcomm snapdragon_730g_firmware
58 Qualcomm snapdragon_732g_firmware
59 Qualcomm snapdragon_750g_5g_firmware
60 Qualcomm snapdragon_765_5g_firmware
61 Qualcomm snapdragon_765g_5g_firmware
62 Qualcomm snapdragon_768g_5g_firmware
63 Qualcomm snapdragon_855_firmware
64 Qualcomm snapdragon_855\+_firmware
65 Qualcomm snapdragon_860_firmware
66 Qualcomm snapdragon_x50_5g_firmware
67 Qualcomm snapdragon_x55_5g_firmware
68 Qualcomm vision_intelligence_400_firmware
69 Qualcomm aqt1000
70 Qualcomm qca6391
71 Qualcomm qca6420
72 Qualcomm qca6430
73 Qualcomm qcs410
74 Qualcomm qcs610
75 Qualcomm sc8180x\+sdx55
76 Qualcomm sd460
77 Qualcomm sd662
78 Qualcomm sd730
79 Qualcomm sd855
80 Qualcomm sdx55
81 Qualcomm sm4125
82 Qualcomm sm6250
83 Qualcomm sm6250p
84 Qualcomm sm7250p
85 Qualcomm wcd9326
86 Qualcomm wcd9335
87 Qualcomm wcd9340
88 Qualcomm wcd9341
89 Qualcomm wcd9370
90 Qualcomm wcd9375
91 Qualcomm wcd9380
92 Qualcomm wcd9385
93 Qualcomm wcn3910
94 Qualcomm wcn3950
95 Qualcomm wcn3980
96 Qualcomm wcn3988
97 Qualcomm wcn3990
98 Qualcomm wsa8810
99 Qualcomm wsa8815
100 Qualcomm wsa8830
101 Qualcomm wsa8835
102 Qualcomm qcn7606
103 Qualcomm fastconnect_6200
104 Qualcomm fastconnect_6800
105 Qualcomm sc8180x-ad
106 Qualcomm sc8180xp-ad
107 Qualcomm sc8180x-aa
108 Qualcomm sc8180x-ab
109 Qualcomm sc8180xp-ac
110 Qualcomm sc8180xp-af
111 Qualcomm sc8180x-ac
112 Qualcomm sc8180x-af
113 Qualcomm sc8180xp-aa
114 Qualcomm sc8180xp-ab
115 Qualcomm snapdragon_x55_5g
116 Qualcomm snapdragon_460
117 Qualcomm snapdragon_480_5g
118 Qualcomm snapdragon_480\+_5g
119 Qualcomm snapdragon_662
120 Qualcomm snapdragon_675
121 Qualcomm snapdragon_678
122 Qualcomm snapdragon_690_5g
123 Qualcomm snapdragon_695_5g
124 Qualcomm snapdragon_720g
125 Qualcomm snapdragon_730
126 Qualcomm snapdragon_730g
127 Qualcomm snapdragon_732g
128 Qualcomm snapdragon_750g_5g
129 Qualcomm snapdragon_765_5g
130 Qualcomm snapdragon_765g_5g
131 Qualcomm snapdragon_768g_5g
132 Qualcomm snapdragon_855
133 Qualcomm snapdragon_x50_5g
134 Qualcomm vision_intelligence_400
135 Qualcomm snapdragon_855\+
136 Qualcomm snapdragon_860
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-28562.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-28562 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-28562 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Apr. 12, 2024

    Action Type Old Value New Value
    Added CWE Qualcomm, Inc. CWE-120
  • Initial Analysis by [email protected]

    Sep. 08, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin Vendor Advisory
    Added CWE NIST CWE-787
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x\+sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x\+sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_460_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_460:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_480_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_480_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_480\+_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_480\+_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_662_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_662:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_675_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_675:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_678_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_678:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_690_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_690_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_695_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_695_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_720g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_720g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_730_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_730:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_730g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_730g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_732g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_732g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_750g_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_750g_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_765_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_765_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_765g_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_765g_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_768g_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_768g_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_855\+_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_855\+:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_860_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_860:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x-ad_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x-ad:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180xp-ad_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180xp-ad:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x-aa_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x-aa:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x-ab_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x-ab:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180xp-ac_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180xp-ac:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180xp-af_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180xp-af:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x-ac_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x-ac:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x-af_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x-af:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180xp-aa_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180xp-aa:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180xp-ab_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180xp-ab:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x50_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x50_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x55_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x55_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:vision_intelligence_400_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:vision_intelligence_400:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-28562 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.14 }} 0.00%

score

0.50886

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability