Unrated severityNVD Advisory· Published Sep 20, 2023· Updated Apr 7, 2025
JWT token compromise can allow malicious actions including Remote Code Execution (RCE)
CVE-2023-22644
Description
A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
Affected products
69- osv-coords68 versionspkg:rpm/opensuse/govulncheck-vulndb&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/govulncheck-vulndb&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/govulncheck-vulndb&distro=openSUSE%20Tumbleweedpkg:rpm/suse/branch-network-formula&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/branch-network-formula&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/cobbler&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/cpu-mitigations-formula&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/cpu-mitigations-formula&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/govulncheck-vulndb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP5pkg:rpm/suse/govulncheck-vulndb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6pkg:rpm/suse/govulncheck-vulndb&distro=SUSE%20Package%20Hub%2012pkg:rpm/suse/hub-xmlrpc-api&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/hub-xmlrpc-api&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/inter-server-sync&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/mgr-daemon&distro=SUSE%20Manager%20Proxy%20Module%204.3pkg:rpm/suse/perl-Satcon&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/perl-Satcon&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/python-urlgrabber&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/release-notes-susemanager&distro=SUSE%20Manager%20Server%204.2pkg:rpm/suse/release-notes-susemanager&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/release-notes-susemanager-proxy&distro=SUSE%20Manager%20Proxy%204.2pkg:rpm/suse/release-notes-susemanager-proxy&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/spacecmd&distro=SUSE%20Manager%20Proxy%20Module%204.2pkg:rpm/suse/spacecmd&distro=SUSE%20Manager%20Proxy%20Module%204.3pkg:rpm/suse/spacecmd&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/spacecmd&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/spacewalk-admin&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/spacewalk-backend&distro=SUSE%20Manager%20Proxy%20Module%204.2pkg:rpm/suse/spacewalk-backend&distro=SUSE%20Manager%20Proxy%20Module%204.3pkg:rpm/suse/spacewalk-backend&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/spacewalk-backend&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/spacewalk-certs-tools&distro=SUSE%20Manager%20Proxy%20Module%204.2pkg:rpm/suse/spacewalk-certs-tools&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/spacewalk-config&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/spacewalk-java&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/spacewalk-java&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/spacewalk-proxy&distro=SUSE%20Manager%20Proxy%20Module%204.3pkg:rpm/suse/spacewalk-proxy-installer&distro=SUSE%20Manager%20Proxy%20Module%204.2pkg:rpm/suse/spacewalk-proxy-installer&distro=SUSE%20Manager%20Proxy%20Module%204.3pkg:rpm/suse/spacewalk-search&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/spacewalk-setup&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/spacewalk-setup&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/spacewalk-ssl-cert-check&distro=SUSE%20Manager%20Proxy%20Module%204.2pkg:rpm/suse/spacewalk-utils&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/spacewalk-web&distro=SUSE%20Manager%20Proxy%20Module%204.2pkg:rpm/suse/spacewalk-web&distro=SUSE%20Manager%20Proxy%20Module%204.3pkg:rpm/suse/spacewalk-web&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/spacewalk-web&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/supportutils-plugin-susemanager&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/supportutils-plugin-susemanager&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/susemanager-build-keys&distro=SUSE%20Manager%20Proxy%20Module%204.2pkg:rpm/suse/susemanager-build-keys&distro=SUSE%20Manager%20Proxy%20Module%204.3pkg:rpm/suse/susemanager-build-keys&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/susemanager-build-keys&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/susemanager&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/susemanager&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/susemanager-doc-indexes&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/susemanager-docs_en&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/susemanager-docs_en&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/susemanager-schema&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/susemanager-schema&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/susemanager-sls&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/susemanager-sls&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/susemanager-tftpsync&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/uyuni-common-libs&distro=SUSE%20Manager%20Proxy%20Module%204.3pkg:rpm/suse/uyuni-common-libs&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/virtual-host-gatherer&distro=SUSE%20Manager%20Server%20Module%204.2pkg:rpm/suse/virtual-host-gatherer&distro=SUSE%20Manager%20Server%20Module%204.3
< 0.0.20241030T212825-150000.1.9.1+ 67 more
- (no CPE)range: < 0.0.20241030T212825-150000.1.9.1
- (no CPE)range: < 0.0.20241030T212825-150000.1.9.1
- (no CPE)range: < 0.0.20241030T212825-1.1
- (no CPE)range: < 0.1.1680167239.23f2fec-150300.3.6.2
- (no CPE)range: < 0.1.1680167239.23f2fec-150400.3.3.3
- (no CPE)range: < 3.3.3-150400.5.25.3
- (no CPE)range: < 0.5.0-150300.3.6.2
- (no CPE)range: < 0.5.0-150400.3.3.3
- (no CPE)range: < 0.0.20241030T212825-150000.1.9.1
- (no CPE)range: < 0.0.20241030T212825-150000.1.9.1
- (no CPE)range: < 0.0.20241104T154416-5.1
- (no CPE)range: < 0.7-150300.3.12.3
- (no CPE)range: < 0.7-150400.5.6.5
- (no CPE)range: < 0.2.8-150300.8.31.2
- (no CPE)range: < 4.3.7-150400.3.9.5
- (no CPE)range: < 4.2.3-150300.3.3.3
- (no CPE)range: < 4.3.2-150400.3.3.5
- (no CPE)range: < 4.1.0-150400.4.3.6.3
- (no CPE)range: < 4.2.13-150300.3.81.1
- (no CPE)range: < 4.3.6-150400.3.63.2
- (no CPE)range: < 4.2.13-150300.3.64.2
- (no CPE)range: < 4.3.6-150400.3.55.4
- (no CPE)range: < 4.2.23-150300.4.39.4
- (no CPE)range: < 4.3.21-150400.3.18.5
- (no CPE)range: < 4.2.23-150300.4.39.4
- (no CPE)range: < 4.3.21-150400.3.18.5
- (no CPE)range: < 4.3.11-150400.3.6.6
- (no CPE)range: < 4.2.28-150300.4.41.4
- (no CPE)range: < 4.3.21-150400.3.21.13
- (no CPE)range: < 4.2.28-150300.4.41.4
- (no CPE)range: < 4.3.21-150400.3.21.13
- (no CPE)range: < 4.2.20-150300.3.30.4
- (no CPE)range: < 4.2.20-150300.3.30.4
- (no CPE)range: < 4.3.10-150400.3.6.3
- (no CPE)range: < 4.2.50-150300.3.66.5
- (no CPE)range: < 4.3.58-150400.3.46.4
- (no CPE)range: < 4.3.16-150400.3.20.6
- (no CPE)range: < 4.2.12-150300.3.17.2
- (no CPE)range: < 4.3.11-150400.3.6.4
- (no CPE)range: < 4.3.9-150400.3.12.7
- (no CPE)range: < 4.2.12-150300.3.18.3
- (no CPE)range: < 4.3.16-150400.3.21.6
- (no CPE)range: < 4.2.3-150300.3.3.2
- (no CPE)range: < 4.2.19-150300.3.24.2
- (no CPE)range: < 4.2.35-150300.3.44.4
- (no CPE)range: < 4.3.31-150400.3.21.7
- (no CPE)range: < 4.2.35-150300.3.44.4
- (no CPE)range: < 4.3.31-150400.3.21.7
- (no CPE)range: < 4.2.7-150300.3.15.4
- (no CPE)range: < 4.3.7-150400.3.9.6
- (no CPE)range: < 15.3.9-150300.3.14.1
- (no CPE)range: < 15.4.9-150400.3.20.2
- (no CPE)range: < 15.3.9-150300.3.14.1
- (no CPE)range: < 15.4.9-150400.3.20.2
- (no CPE)range: < 4.2.42-150300.3.54.4
- (no CPE)range: < 4.3.27-150400.3.26.5
- (no CPE)range: < 4.2-150300.12.45.4
- (no CPE)range: < 4.2-150300.12.45.2
- (no CPE)range: < 4.3-150400.9.27.3
- (no CPE)range: < 4.2.28-150300.3.38.4
- (no CPE)range: < 4.3.18-150400.3.18.7
- (no CPE)range: < 4.2.34-150300.3.51.1
- (no CPE)range: < 4.3.33-150400.3.25.7
- (no CPE)range: < 4.3.4-150400.3.9.9
- (no CPE)range: < 4.3.8-150400.3.12.5
- (no CPE)range: < 4.3.8-150400.3.12.5
- (no CPE)range: < 1.0.26-150300.3.15.2
- (no CPE)range: < 1.0.26-150400.3.12.3
- SUSE/neuvectorv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.