Skip to main content

CVE-2023-47320: n/a in n/a

High
VulnerabilityCVE-2023-47320cvecve-2023-47320
Published: Wed Dec 13 2023 (12/13/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Silverpeas Core 6.3.1 is vulnerable to Incorrect Access Control. An attacker with low privileges is able to execute the administrator-only function of putting the application in "Maintenance Mode" due to broken access control. This makes the application unavailable to all users. This affects Silverpeas Core 6.3.1 and below.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:42:48 UTC

Technical Analysis

CVE-2023-47320 is a high-severity vulnerability affecting Silverpeas Core version 6.3.1 and earlier. The vulnerability stems from incorrect access control (CWE-863), allowing an attacker with low privileges to invoke an administrator-only function: placing the application into "Maintenance Mode." This function is intended to be restricted to administrators to prevent unauthorized disruption. However, due to broken access control mechanisms, the attacker can trigger this mode without proper authorization. When the application enters Maintenance Mode, it becomes unavailable to all users, effectively causing a denial of service (DoS) condition. The vulnerability is remotely exploitable over the network (AV:N), requires low privileges (PR:L), does not require user interaction (UI:N), and affects the integrity and availability of the application (I:H, A:H) but not confidentiality (C:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other components or systems. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on December 13, 2023, and is tracked under CVE-2023-47320.

Potential Impact

For European organizations using Silverpeas Core 6.3.1 or earlier, this vulnerability poses a significant risk of service disruption. Silverpeas is a collaborative platform often used for intranet portals, document management, and enterprise content management. An attacker exploiting this flaw could cause downtime by forcing the platform into Maintenance Mode, impacting business continuity, employee productivity, and potentially critical internal communications. While the vulnerability does not expose sensitive data directly, the denial of service could indirectly affect confidentiality and integrity by preventing timely access to information or updates. Organizations relying heavily on Silverpeas for operational workflows could face operational delays and reputational damage. Furthermore, sectors with strict availability requirements, such as government agencies, healthcare, and financial institutions, may experience compliance issues or service level agreement (SLA) breaches due to unplanned outages.

Mitigation Recommendations

Organizations should immediately audit their Silverpeas Core deployments to identify affected versions (6.3.1 and below). Until an official patch is released, implement strict network-level access controls to limit access to the Silverpeas management interfaces only to trusted administrators and internal networks. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized attempts to invoke the Maintenance Mode function. Monitor application logs for unusual access patterns or attempts to trigger administrative functions by low-privilege users. Additionally, review and harden role-based access control (RBAC) configurations within Silverpeas to ensure no unintended privilege escalations are possible. Consider isolating the Silverpeas server in a segmented network zone to reduce exposure. Once a vendor patch becomes available, prioritize timely deployment. Finally, conduct user awareness training to recognize and report suspicious activities related to the platform.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-11-06T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f6ee00acd01a24926471c

Added to database: 5/22/2025, 6:37:20 PM

Last enriched: 7/8/2025, 7:42:48 AM

Last updated: 7/29/2025, 3:55:27 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats