PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-4669 Exagate CVE debrief

CVE-2023-4669 was published on 2023-09-14 and later modified in NVD on 2026-05-21. The issue is an authentication bypass in Exagate SYSGuard 3001, affecting firmware versions before 3.2.20.0. NVD rates the issue as critical with a network-reachable, no-privileges, no-user-interaction CVSS 3.1 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating high potential impact if an affected device is exposed.

Vendor
Exagate
Product
SYSGuard 3001
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2023-09-14
Original CVE updated
2026-05-21
Advisory published
2023-09-14
Advisory updated
2026-05-21

Who should care

Organizations running Exagate SYSGuard 3001 firmware, especially security teams, network administrators, and asset owners responsible for remote-management or perimeter devices. Exposed or internet-reachable systems should be treated as urgent because the vulnerability requires no privileges or user interaction and can lead to full compromise of confidentiality, integrity, and availability.

Technical summary

The NVD record identifies vulnerable Exagate SYSGuard 3001 firmware versions before 3.2.20.0 and does not mark the hardware CPE itself as vulnerable. The vulnerability is described as an authentication bypass tied to assumed-immutable data. NVD maps the issue to CWE-287 as the primary weakness, with USOM also referencing CWE-302 as a secondary weakness. The published CVSS vector shows a remotely exploitable flaw with no authentication required and high CIA impact.

Defensive priority

Critical / immediate. Prioritize patching or isolating affected SYSGuard 3001 firmware before 3.2.20.0 as soon as possible, with highest urgency for any device reachable from less-trusted networks.

Recommended defensive actions

  • Inventory all Exagate SYSGuard 3001 deployments and confirm whether any firmware is earlier than 3.2.20.0.
  • Apply the vendor fix or upgrade to a non-vulnerable firmware release at or above 3.2.20.0.
  • Restrict administrative and management access to trusted networks while remediation is in progress.
  • Review authentication, administrator, and remote-access logs for signs of unauthorized access around affected devices.
  • After remediation, verify the installed firmware version and review configurations; rotate administrative credentials if there is any indication of compromise.

Evidence notes

This debrief is based on the supplied NVD record and its referenced advisories. The CVE was published on 2023-09-14 and the NVD record was modified on 2026-05-21. NVD lists vulnerable firmware criteria for cpe:2.3:o:exagate:sysguard_3001_firmware:* with the vulnerable range ending before 3.2.20.0, while the hardware CPE is not marked vulnerable. The CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H supports a high-priority defensive response.

Official resources

Publicly disclosed in the CVE record on 2023-09-14; the NVD record was last modified on 2026-05-21. No KEV listing or ransomware-campaign attribution was provided in the supplied data.