CVE-2023-32265

Mitigations and availability of updates relating to security vulnerability in ESCWA component CVE-2023-32265.

Description

A potential security vulnerability has been identified in the Enterprise Server Common Web Administration (ESCWA) component used in Enterprise Server, Enterprise Test Server, Enterprise Developer, Visual COBOL, and COBOL Server. An attacker would need to be authenticated into ESCWA to attempt to exploit this vulnerability. As described in the hardening guide in the product documentation, other mitigations including restricting network access to ESCWA and restricting users’ permissions in the Micro Focus Directory Server also reduce the exposure to this issue. Given the right conditions this vulnerability could be exploited to expose a service account password. The account corresponding to the exposed credentials usually has limited privileges and, in many cases would only be useful for extracting details of other user accounts and similar information.

Remediation

Solution:

  • Enterprise Server, Enterprise Test Server, Enterprise Developer, Visual COBOL, and COBOL Server Versions 6.0, 7.0, and 8.0 all include a fix for this issue in their latest released patch updates.
7.1
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.16%
Vendor Advisory microfocus.com
Affected: Micro Focus Enterprise Server
Affected: Micro Focus Enterprise Test Server
Affected: Micro Focus Enterprise Developer
Affected: Micro Focus Visual COBOL
Affected: Micro Focus COBOL Server
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-32265?
CVE-2023-32265 has been scored as a high severity vulnerability.
How to fix CVE-2023-32265?
To fix CVE-2023-32265: Enterprise Server, Enterprise Test Server, Enterprise Developer, Visual COBOL, and COBOL Server Versions 6.0, 7.0, and 8.0 all include a fix for this issue in their latest released patch updates.
Is CVE-2023-32265 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-32265 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-32265?
CVE-2023-32265 affects Micro Focus Enterprise Server, Micro Focus Enterprise Test Server, Micro Focus Enterprise Developer, Micro Focus Visual COBOL, Micro Focus COBOL Server.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.