{"api_version":"1","generated_at":"2026-04-22T19:06:49+00:00","cve":"CVE-2023-27100","urls":{"html":"https://cve.report/CVE-2023-27100","api":"https://cve.report/api/cve/CVE-2023-27100.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-27100","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-27100"},"summary":{"title":"CVE-2023-27100","description":"Improper restriction of excessive authentication attempts in the SSHGuard component of Netgate pfSense Plus software v22.05.1 and pfSense CE software v2.6.0 allows attackers to bypass brute force protection mechanisms via crafted web requests.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-03-22 23:15:00","updated_at":"2023-04-10 20:15:00"},"problem_types":["CWE-307"],"metrics":[],"references":[{"url":"https://docs.netgate.com/downloads/pfSense-SA-23_05.sshguard.asc","name":"https://docs.netgate.com/downloads/pfSense-SA-23_05.sshguard.asc","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://redmine.pfsense.org/issues/13574","name":"https://redmine.pfsense.org/issues/13574","refsource":"MISC","tags":[],"title":"Bug #13574: Extra remote address information can confuse ``sshguard`` - pfSense - pfSense bugtracker","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/171791/pfsenseCE-2.6.0-Protection-Bypass.html","name":"http://packetstormsecurity.com/files/171791/pfsenseCE-2.6.0-Protection-Bypass.html","refsource":"MISC","tags":[],"title":"pfsenseCE 2.6.0 Protection Bypass ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-27100","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27100","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"27100","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netgate","cpe5":"pfsense_plus","cpe6":"22.05.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"27100","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pfsense","cpe5":"pfsense","cpe6":"2.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"community","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2023-27100","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Improper restriction of excessive authentication attempts in the SSHGuard component of Netgate pfSense Plus software v22.05.1 and pfSense CE software v2.6.0 allows attackers to bypass brute force protection mechanisms via crafted web requests."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://docs.netgate.com/downloads/pfSense-SA-23_05.sshguard.asc","refsource":"MISC","name":"https://docs.netgate.com/downloads/pfSense-SA-23_05.sshguard.asc"},{"url":"https://redmine.pfsense.org/issues/13574","refsource":"MISC","name":"https://redmine.pfsense.org/issues/13574"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/171791/pfsenseCE-2.6.0-Protection-Bypass.html","url":"http://packetstormsecurity.com/files/171791/pfsenseCE-2.6.0-Protection-Bypass.html"}]}},"nvd":{"publishedDate":"2023-03-22 23:15:00","lastModifiedDate":"2023-04-10 20:15:00","problem_types":["CWE-307"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netgate:pfsense_plus:22.05.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pfsense:pfsense:2.6.0:*:*:*:community:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}