Security for everyone

CVE-2023-22897 Scanner

Detects 'Information Disclosure' vulnerability in SecurePoint UTM affects v. before


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2023-22897 Scanner Detail

SecurePoint UTM is a firewall that is commonly used to protect digital assets and networks from cyber threats such as malware, viruses, and other forms of unauthorized access. This product is designed to provide comprehensive protection by monitoring and filtering incoming and outgoing traffic, as well as detecting and blocking suspicious activities in real-time. It is a critical tool in ensuring the security of digital assets against cyberattacks.

CVE-2023-22897 is a vulnerability that has been detected in SecurePoint UTM software before version This vulnerability specifically relates to the firewall's endpoint at /spcgi.cgi, which allows unauthorized individuals to gain access to memory contents. By exploiting this vulnerability, attackers could potentially steal sensitive information such as login credentials, session tokens, and other data that can be used to compromise digital assets.

When exploited, this vulnerability can lead to a range of negative consequences. For example, attackers can use the stolen data to gain unauthorized access to systems, steal intellectual property, or cause network disruptions. It can also result in the loss or theft of sensitive data, which can result in reputational damage, legal issues, or financial losses.

In conclusion, the platform features pro tools that enable individuals to quickly and easily assess vulnerabilities in their digital assets. With these tools, users can identify potential weaknesses and take preventative measures to enhance security. By staying informed and vigilant, individuals can prevent cyberattacks and effectively protect their digital assets from unauthorized access and other malicious activities.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture