CVE-2023-28835

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-28835
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28835.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-28835
Aliases
  • GHSA-7w2p-rp9m-9xp9
Published
2023-03-30T18:57:00Z
Modified
2025-10-22T18:37:48.854940Z
Severity
  • 3.5 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Insecure randomness for default password in nextcloud
Details

Nextcloud server is an open source home cloud implementation. In affected versions the generated fallback password when creating a share was using a weak complexity random number generator, so when the sharer did not change it the password could be guessable to an attacker willing to brute force it. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. This issue only affects users who do not have a password policy enabled, so enabling a password policy is an effective mitigation for users unable to upgrade.

Database specific
{
    "cwe_ids": [
        "CWE-338"
    ]
}
References

Affected packages

Git / github.com/nextcloud/server

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/server
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/nextcloud/server
Events

Affected versions

Other

list

v1.*

v1.0.0beta1
v1.0RC1
v1.1

v11.*

v11.0.0
v11.0RC2

v12.*

v12.0.0beta1
v12.0.0beta2
v12.0.0beta3
v12.0.0beta4

v13.*

v13.0.0RC1
v13.0.0beta1
v13.0.0beta2
v13.0.0beta3
v13.0.0beta4

v14.*

v14.0.0RC1
v14.0.0RC2
v14.0.0beta1
v14.0.0beta2
v14.0.0beta3
v14.0.0beta4

v15.*

v15.0.0RC1
v15.0.0beta1
v15.0.0beta2

v16.*

v16.0.0RC1
v16.0.0alpha1
v16.0.0beta1
v16.0.0beta2
v16.0.0beta3

v17.*

v17.0.0beta1
v17.0.0beta2
v17.0.0beta3
v17.0.0beta4

v18.*

v18.0.0RC1
v18.0.0beta1
v18.0.0beta2
v18.0.0beta3
v18.0.0beta4

v19.*

v19.0.0RC1
v19.0.0RC2
v19.0.0beta1
v19.0.0beta2
v19.0.0beta3
v19.0.0beta4
v19.0.0beta5
v19.0.0beta6
v19.0.0beta7

v2.*

v2.0beta3

v20.*

v20.0.0RC1
v20.0.0beta1
v20.0.0beta2
v20.0.0beta3
v20.0.0beta4

v21.*

v21.0.0beta1
v21.0.0beta2
v21.0.0beta3
v21.0.0beta4
v21.0.0beta5
v21.0.0beta6
v21.0.0beta7
v21.0.0beta8

v22.*

v22.0.0beta1
v22.0.0beta2
v22.0.0beta3
v22.0.0beta4
v22.0.0beta5
v22.0.0rc1

v23.*

v23.0.0beta1
v23.0.0beta2
v23.0.0beta3

v24.*

v24.0.0
v24.0.0beta1
v24.0.0beta2
v24.0.0beta3
v24.0.0rc1
v24.0.0rc2
v24.0.0rc3
v24.0.1
v24.0.10rc1
v24.0.1rc1
v24.0.2
v24.0.2rc1
v24.0.3
v24.0.3rc1
v24.0.3rc2
v24.0.4
v24.0.4rc1
v24.0.5
v24.0.5rc1
v24.0.6
v24.0.6rc1
v24.0.7
v24.0.7rc1
v24.0.8
v24.0.8rc1
v24.0.8rc2
v24.0.9
v24.0.9rc1
v24.0.9rc2

v25.*

v25.0.0
v25.0.1
v25.0.1rc1
v25.0.2
v25.0.2rc1
v25.0.2rc2
v25.0.2rc3
v25.0.3
v25.0.3rc1
v25.0.3rc2
v25.0.4rc1

v3.*

v3.0
v3.0RC1
v3.0alpha1

v4.*

v4.0.0
v4.0.0RC
v4.0.0RC2
v4.0.0beta
v4.0.1
v4.0.3
v4.0.4
v4.0.5
v4.0.6
v4.5.0
v4.5.0RC1
v4.5.0RC2
v4.5.0RC3
v4.5.0beta1
v4.5.0beta2
v4.5.0beta3
v4.5.0beta4

v5.*

v5.0.0
v5.0.0RC1
v5.0.0RC2
v5.0.0RC3
v5.0.0alpha1
v5.0.0beta1
v5.0.0beta2

v6.*

v6.0.0RC1
v6.0.0RC2
v6.0.0alpha2
v6.0.0beta2
v6.0.0beta3
v6.0.0beta4
v6.0.0beta5

v7.*

v7.0.0alpha2
v7.0.0beta1

v8.*

v8.0.0
v8.0.0RC1
v8.0.0RC2
v8.0.0alpha1
v8.0.0alpha2
v8.0.0beta1
v8.0.0beta2
v8.1.0alpha1
v8.1.0alpha2
v8.1.0beta1
v8.1.0beta2
v8.1RC2
v8.2RC1
v8.2beta1

v9.*

v9.0.0beta2
v9.0.1beta2
v9.0beta1
v9.1.0beta1
v9.1.0beta2