Skip to main content

CVE-2023-45559: n/a in n/a

High
VulnerabilityCVE-2023-45559cvecve-2023-45559
Published: Wed Jan 03 2024 (01/03/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue in Tamaki_hamanoki Line v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.

AI-Powered Analysis

AILast updated: 07/04/2025, 06:26:21 UTC

Technical Analysis

CVE-2023-45559 is a high-severity vulnerability identified in the Tamaki_hamanoki Line version 13.6.1 messaging platform. The core issue stems from the leakage of the channel access token, a critical authentication credential used to authorize and send notifications within the platform. Attackers exploiting this vulnerability can craft and send unauthorized notifications by leveraging the leaked token. The CVSS 3.1 base score of 8.2 reflects the vulnerability's high impact, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and with low attack complexity (AC:L). The scope remains unchanged (S:U), but the confidentiality impact is high (C:H), indicating that sensitive information can be exposed or compromised. The integrity impact is low (I:L), suggesting limited ability to alter data, and availability impact is none (A:N), meaning the service remains operational despite exploitation. Although no known exploits are reported in the wild yet, the vulnerability's characteristics make it a significant risk, especially for organizations relying on this messaging platform for internal or external communications. The absence of vendor and product details limits the ability to identify the exact environment, but the vulnerability's nature implies that any entity using this version of the platform is susceptible to unauthorized message injection, potentially leading to phishing, misinformation, or social engineering attacks.

Potential Impact

For European organizations, the impact of CVE-2023-45559 can be substantial, particularly for those using the affected messaging platform for business communications, customer engagement, or internal notifications. Unauthorized crafted notifications can lead to misinformation dissemination, phishing attacks, or social engineering campaigns targeting employees or customers. This can result in data breaches, financial fraud, reputational damage, and erosion of trust. Confidentiality is highly at risk due to token leakage, potentially exposing sensitive communication channels or user data. Although the integrity impact is low, the ability to send unauthorized messages can indirectly affect operational decisions and security postures. The lack of availability impact means services remain online, but the trustworthiness of communications is compromised. European organizations in sectors such as finance, healthcare, government, and critical infrastructure, where secure communication is paramount, may face increased risks. Additionally, compliance with GDPR and other data protection regulations may be jeopardized if personal data is exposed or misused through this vulnerability.

Mitigation Recommendations

To mitigate CVE-2023-45559 effectively, organizations should first identify if they are using Tamaki_hamanoki Line version 13.6.1 or related vulnerable versions. Immediate steps include: 1) Restricting and rotating channel access tokens to invalidate potentially leaked credentials. 2) Implementing strict access controls and monitoring for unusual notification activity to detect unauthorized message sending. 3) Employing network-level protections such as firewall rules and intrusion detection systems to limit exposure of the messaging platform's API endpoints. 4) Enhancing logging and alerting mechanisms to capture anomalous usage patterns related to notification sending. 5) Engaging with the vendor or community to obtain patches or updates addressing the vulnerability, and applying them promptly once available. 6) Educating users and administrators about phishing and social engineering risks stemming from unauthorized notifications. 7) Considering additional authentication layers or token scope restrictions to minimize the impact of token leakage. These measures go beyond generic advice by focusing on token management, monitoring, and layered defenses tailored to the vulnerability's exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-10-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff304

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 7/4/2025, 6:26:21 AM

Last updated: 7/27/2025, 12:48:09 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats