CVE-2023-6298
low-risk
Published 2023-11-26
A vulnerability classified as problematic was found in Apryse iText 8.0.2. This vulnerability affects the function main of the file PdfDocument.java. The manipulation leads to improper validation of array index. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of this vulnerability is VDB-246124. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. A statement published afterwards explains that the exception is not a vulnerability and the identified CWEs might not apply to the software.
Do I need to act?
-
0.07% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Itext
Affected Vendors
References (8)
Third Party Advisory
https://kb.itextpdf.com/itext/statement-regarding-cve-2022-24198-and-2023-6298
Third Party Advisory
https://vuldb.com/?ctiid.246124
Third Party Advisory
https://vuldb.com/?id.246124
Third Party Advisory
https://kb.itextpdf.com/itext/statement-regarding-cve-2022-24198-and-2023-6298
Third Party Advisory
https://vuldb.com/?ctiid.246124
Third Party Advisory
https://vuldb.com/?id.246124
23
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal