CVE-2023-3519

critical

Description

Unauthenticated remote code execution

References

https://securityaffairs.com/181453/apt/china-linked-silk-typhoon-apt-targets-north-america.html

https://www.securityweek.com/chinese-silk-typhoon-hackers-exploited-commvault-zero-day/

https://www.helpnetsecurity.com/2025/08/22/china-linked-murky-panda-targets-and-moves-laterally-through-cloud-services/

https://www.darkreading.com/cloud-security/silk-typhoon-north-american-orgs-cloud

https://www.bleepingcomputer.com/news/security/murky-panda-hackers-exploit-cloud-trust-to-hack-downstream-customers/

https://thehackernews.com/2025/08/chinese-hackers-murky-genesis-and.html

https://www.crowdstrike.com/en-us/blog/murky-panda-trusted-relationship-threat-in-cloud/

https://cyberscoop.com/crowdstrike-silk-typhoon-murky-panda-china-espionage/

https://horizon3.ai/attack-research/attack-blogs/cve-2025-5777-citrixbleed-2-write-up-maybe/

https://www.theregister.com/2025/03/05/china_silk_typhoon_update/

https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/

https://www.darkreading.com/remote-workforce/china-silk-typhoon-it-supply-chain-attacks

https://www.bleepingcomputer.com/news/security/silk-typhoon-hackers-now-target-it-supply-chains-to-breach-networks/

https://thehackernews.com/2025/03/china-linked-silk-typhoon-expands-cyber.html

https://www.security.com/threat-intelligence/ransomware-trends-2025

https://www.securityweek.com/citrix-cisco-fortinet-zero-days-among-2023s-most-exploited-vulnerabilities/

https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a

https://www.reliaquest.com/blog/inc-ransom-attack-analysis-extortion-methodologies/

https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-242a

https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a

https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a

https://securityaffairs.com/164838/breaking-news/excobalt-cybercrime-group-targets-russian-orgs.html

https://services.google.com/fh/files/misc/m-trends-2024.pdf

https://therecord.media/xerox-xbs-cyberattack?&web_view=true

Details

Source: Mitre, NVD

Published: 2023-07-19

Updated: 2025-10-24

Known Exploited Vulnerability (KEV)

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.94052

Vulnerability Watch

Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.

Vulnerability of Concern