- What is the severity of CVE-2023-6836?
- CVE-2023-6836 has been scored as a medium severity vulnerability.
- How to fix CVE-2023-6836?
- To fix CVE-2023-6836: For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly. Community users may apply the relevant fixes to the product based on the public fix(s) advertised in https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/ https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/
- Is CVE-2023-6836 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2023-6836 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2023-6836?
- CVE-2023-6836 affects WSO2 WSO2 API Manager , WSO2 WSO2 API Manager Analytics, WSO2 WSO2 API Microgateway, WSO2 WSO2 Enterprise Integrator, WSO2 WSO2 IS as Key Manager, WSO2 WSO2 Identity Server, WSO2 WSO2 Micro Integrator.