CVE-2023-47631

vantage6 is a framework to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). In affected versions a node does not check if an image is allowed to run if a `parent_id` is set. A malicious party that breaches the server may modify it to set a fake `parent_id` and send a task of a non-whitelisted algorithm. The node will then execute it because the `parent_id` that is set prevents checks from being run. This impacts all servers that are breached by an expert user. This vulnerability has been patched in version 4.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vantage6:vantage6:*:*:*:*:*:*:*:*
cpe:2.3:a:vantage6:vantage6:4.1.2:rc1:*:*:*:*:*:*

History

21 Nov 2024, 08:30

Type Values Removed Values Added
References () https://github.com/vantage6/vantage6/blob/version/4.1.1/vantage6-node/vantage6/node/docker/docker_manager.py#L265-L268 - Product () https://github.com/vantage6/vantage6/blob/version/4.1.1/vantage6-node/vantage6/node/docker/docker_manager.py#L265-L268 - Product
References () https://github.com/vantage6/vantage6/commit/bf83521eb12fa80aa5fc92ef1692010a9a7f8243 - Patch () https://github.com/vantage6/vantage6/commit/bf83521eb12fa80aa5fc92ef1692010a9a7f8243 - Patch
References () https://github.com/vantage6/vantage6/security/advisories/GHSA-vc3v-ppc7-v486 - Vendor Advisory () https://github.com/vantage6/vantage6/security/advisories/GHSA-vc3v-ppc7-v486 - Vendor Advisory
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 7.2

30 Nov 2023, 05:39

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-14 21:15

Updated : 2024-11-21 08:30


NVD link : CVE-2023-47631

Mitre link : CVE-2023-47631

CVE.ORG link : CVE-2023-47631


JSON object : View

Products Affected

vantage6

  • vantage6
CWE
CWE-345

Insufficient Verification of Data Authenticity