{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-50343","assignerOrgId":"1e47fe04-f25f-42fa-b674-36de2c5e3cfc","state":"PUBLISHED","assignerShortName":"HCL","dateReserved":"2023-12-07T03:55:55.604Z","datePublished":"2024-01-03T02:37:22.668Z","dateUpdated":"2025-06-18T15:31:13.364Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"DRYiCE MyXalytics","vendor":"HCL Software","versions":[{"status":"affected","version":"5.9, 6.0, 6.1"}]}],"datePublic":"2024-01-03T00:22:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"HCL DRYiCE MyXalytics is impacted by an Improper Access Control (Controller APIs) vulnerability. Certain API endpoints are accessible to Customer Admin Users that can allow access to sensitive information about other users.<br>"}],"value":"HCL DRYiCE MyXalytics is impacted by an Improper Access Control (Controller APIs) vulnerability. Certain API endpoints are accessible to Customer Admin Users that can allow access to sensitive information about other users.\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":8.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"1e47fe04-f25f-42fa-b674-36de2c5e3cfc","shortName":"HCL","dateUpdated":"2024-01-03T02:37:22.668Z"},"references":[{"url":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608"}],"source":{"discovery":"UNKNOWN"},"title":"Improper Access Control (Controller APIs) affects DRYiCE MyXalytics","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T22:16:46.566Z"},"title":"CVE Program Container","references":[{"url":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"CWE-284 Improper Access Control"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-01-03T15:34:57.392675Z","id":"CVE-2023-50343","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-18T15:31:13.364Z"}}]}}