Moby security bypass | CVE-2023-28842
NAME
__________
Moby security bypass
Platforms Affected:
Moby Moby 20.10.23
Moby Moby 23.0.2
Risk Level:
6.8
Exploitability:
Unproven
Consequences:
Denial of Service
DESCRIPTION
__________
Moby could allow a remote attacker to bypass security restrictions, caused by an unprotected alternate channel within encrypted overlay networks. By sending a specially crafted request, an attacker could exploit this vulnerability to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams.
CVSS 3.0 Information
__________
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Access Vector:
Network
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
![Moby security bypass | CVE-2023-28842 1 Buy Me A Coffee](https://www.redpacketsecurity.com/wp-content/uploads/2022/10/buymeacoffee.png)
![Moby security bypass | CVE-2023-28842 2 Patreon](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/Digital-Patreon-Wordmark_FieryCoralv2-1024x209.png)
To keep up to date follow us on the below channels.