{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2023-6681", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computational consumption, causing a denial of service attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption", "cweId": "CWE-400" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Red Hat", "product": { "product_data": [ { "product_name": "Red Hat Enterprise Linux 8", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "version": "8100020240417004735.143e9e98", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "version": "8100020240416171943.823393f5", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "defaultStatus": "affected" } } ] } }, { "product_name": "Red Hat Enterprise Linux 9", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "version": "0:1.5.6-2.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "defaultStatus": "affected" } } ] } }, { "product_name": "Red Hat Ansible Automation Platform 2", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unaffected" } } ] } }, { "product_name": "Red Hat Enterprise Linux 7", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://access.redhat.com/errata/RHSA-2024:3267", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2024:3267" }, { "url": "https://access.redhat.com/errata/RHSA-2024:9281", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2024:9281" }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6681", "refsource": "MISC", "name": "https://access.redhat.com/security/cve/CVE-2023-6681" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260843", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2260843" } ] }, "work_around": [ { "lang": "en", "value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } ] } }