Hertzbeat Fixes YAML Deserialization Vulnerability in Version 1.4.1
CVE-2023-51389
9.8CRITICAL
What is CVE-2023-51389?
The YAML deserialization vulnerability in Hertzbeat arises from the use of the SnakeYAML parser at the /define/yml interface without implementing proper security configurations. This oversight can expose the real-time monitoring system to various security risks, enabling potential attackers to exploit the deserialization process. The vulnerability has been addressed in version 1.4.1, which introduces necessary security measures to safeguard against such threats.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
hertzbeat < 1.4.1
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
