### [CVE-2023-6263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6263) ![](https://img.shields.io/static/v1?label=Product&message=NxCloud&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%2023.1.0.40440%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brighgreen) ### Description An issue was discovered by IPVM team in Network Optix NxCloud before 23.1.0.40440. It was possible to add a fake VMS server to NxCloud by using the exact identification of a legitimate VMS server. As result, it was possible to retrieve authorization headers from legitimate users when the legitimate client connects to the fake VMS server. ### POC #### Reference - https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing #### Github No PoCs found on GitHub currently.