{
  "threat_severity" : "Low",
  "public_date" : "2023-07-18T00:00:00Z",
  "bugzilla" : {
    "description" : "mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023)",
    "id" : "2224217",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2224217"
  },
  "cvss3" : {
    "cvss3_base_score" : "3.1",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
    "status" : "verified"
  },
  "details" : [ "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth).  Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-02-20T00:00:00Z",
    "advisory" : "RHSA-2024:0894",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "mysql:8.0-8090020240126173013.a75119d5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-03-05T00:00:00Z",
    "advisory" : "RHSA-2024:1141",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "mysql-0:8.0.36-1.el9_3"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2619",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-mysql80-mysql-0:8.0.36-1.el7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "mysql",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "mariadb",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "mariadb:10.3/mariadb",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "mariadb:10.5/mariadb",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "mariadb",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat Software Collections",
    "fix_state" : "Not affected",
    "package_name" : "rh-mariadb105-mariadb",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-22048\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-22048" ],
  "name" : "CVE-2023-22048",
  "csaw" : false
}