An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows information disclosure of memory contents to be achieved by an authenticated user. Essentially, uninitialized data can be retrieved via an approach in which a sessionid is obtained but not used.
The product uses or accesses a resource that has not been initialized.
Link | Tags |
---|---|
https://rcesecurity.com | not applicable |
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22897.txt | third party advisory exploit |
http://seclists.org/fulldisclosure/2023/Apr/8 | mailing list third party advisory exploit |
http://packetstormsecurity.com/files/171928/SecurePoint-UTM-12.x-Memory-Leak.html | third party advisory exploit |