Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28619: CWE-862 Missing Authorization in bnayawpguy Resoto

0
Medium
VulnerabilityCVE-2023-28619cvecve-2023-28619cwe-862
Published: Wed Dec 24 2025 (12/24/2025, 12:43:50 UTC)
Source: CVE Database V5
Vendor/Project: bnayawpguy
Product: Resoto

Description

Missing Authorization vulnerability in bnayawpguy Resoto allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Resoto: from n/a through 1.0.8.

AI-Powered Analysis

AILast updated: 12/24/2025, 13:11:56 UTC

Technical Analysis

CVE-2023-28619 identifies a missing authorization vulnerability (CWE-862) in the bnayawpguy Resoto product, affecting versions up to 1.0.8. Resoto is a cloud resource management tool designed to automate inventory and management of cloud assets. The vulnerability arises from incorrectly configured access control security levels, allowing an attacker with some level of privileges (PR:L - low privileges) to perform actions beyond their authorization scope. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. This means an attacker who has some access to the system can exploit the missing authorization checks to modify data or configurations they should not be able to, potentially leading to unauthorized changes in cloud resource management. No patches or fixes are currently published, and no known exploits have been observed in the wild. The vulnerability highlights the importance of proper access control enforcement in cloud management platforms, as improper authorization can lead to privilege escalation or unauthorized configuration changes that may affect cloud security posture.

Potential Impact

For European organizations, the impact of this vulnerability depends on their use of Resoto for cloud resource management. Unauthorized modification of cloud configurations can lead to misconfigurations, exposure of sensitive resources, or disruption of cloud services. Although confidentiality and availability are not directly impacted, integrity violations can cascade into broader security issues, such as enabling lateral movement or privilege escalation within cloud environments. Organizations with critical cloud infrastructure, especially those in regulated sectors like finance, healthcare, or government, may face compliance risks if unauthorized changes go undetected. The lack of known exploits reduces immediate risk, but the presence of a missing authorization flaw warrants proactive risk management. The vulnerability could also be leveraged as part of a multi-stage attack chain, increasing its potential impact. European entities relying heavily on cloud automation and management tools should prioritize assessment and mitigation to maintain cloud security and compliance.

Mitigation Recommendations

1. Conduct a thorough review of access control policies and configurations within Resoto deployments to ensure least privilege principles are enforced. 2. Restrict access to Resoto interfaces and APIs to trusted administrators only, using network segmentation and strong authentication mechanisms. 3. Implement continuous monitoring and alerting for unusual or unauthorized changes in cloud resource configurations managed by Resoto. 4. Use role-based access control (RBAC) to limit user capabilities strictly according to job functions. 5. Until an official patch is released, consider deploying compensating controls such as additional proxy authorization layers or manual approval workflows for critical changes. 6. Keep abreast of vendor advisories and apply patches promptly once available. 7. Conduct security training for administrators on the risks of improper access control and the importance of monitoring. 8. Perform regular audits of cloud resource inventories and configurations to detect unauthorized modifications early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2023-03-20T08:47:17.721Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694be306279c98bf57efd5dd

Added to database: 12/24/2025, 12:56:38 PM

Last enriched: 12/24/2025, 1:11:56 PM

Last updated: 12/25/2025, 5:58:11 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats