CVE-2023-46249

CVSS 3.1 Score 9.8 of 10 (high)

Details

Published Oct 31, 2023
Updated: Nov 8, 2023
CWE ID 287
CWE ID 306

Summary

CVE-2023-46249 affects versions prior to 2023.8.4 and 2023.10.2 of the open-source Identity Provider, authentik. The vulnerability allows an attacker to reset the password of the default admin user (akadmin) without authentication, if it has been deleted. Authentik uses a blueprint to create the default admin user and optionally sets its password from an environment variable. When the user is deleted, the initial setup flow is reactivated, making the default admin user password vulnerable. This issue is resolved in versions 2023.8.4 and 2023.10.2. A workaround is to ensure the default admin user exists and has a strong password, while it is also possible to deactivate the user to prevent logins as akadmin.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-46249 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions