
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-23929 affects vantage6, a privacy preserving federated learning infrastructure, in versions prior to 3.8.0. The vulnerability relates to refresh tokens having no expiration time, which could lead to potential security risks. The issue was discovered and disclosed in February 2023, with a patch released in version 3.8.0 (GitHub Advisory).
The vulnerability stems from refresh tokens being configured with indefinite validity periods. This implementation deviates from security best practices as refresh tokens should have a limited lifetime. The issue is classified with CWE-613 and has been assigned a CVSS score indicating moderate severity (NVD).
The lack of refresh token expiration could potentially lead to unauthorized system access if a refresh token is compromised, as it would remain valid indefinitely. This could result in prolonged unauthorized access to the system since the compromised refresh token could continuously generate new access tokens (GitHub Advisory).
The vulnerability has been fixed in vantage6 version 3.8.0. The patch implements refresh token expiration times of 24-48 hours, along with automatic token refresh functionality for nodes to prevent manual restart requirements. Users should upgrade to version 3.8.0 or later to address this security issue. No workarounds are available for earlier versions (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."