Lucene search

K
cveTwcertCVE-2022-38699
HistorySep 28, 2022 - 4:15 a.m.

CVE-2022-38699

2022-09-2804:15:13
CWE-59
twcert
web.nvd.nist.gov
25
2
cve-2022-38699
armoury crate service
logging function
validation
symbolic link
privilege escalation
system disruption
nvd

CVSS3

5.9

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

AI Score

5.6

Confidence

High

EPSS

0

Percentile

12.6%

Armoury Crate Service’s logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system.

Affected configurations

Nvd
Node
asusarmoury_crate_serviceRange<5.2.10.0
VendorProductVersionCPE
asusarmoury_crate_service*cpe:2.3:a:asus:armoury_crate_service:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Armoury Crate Service",
    "vendor": "ASUS",
    "versions": [
      {
        "status": "affected",
        "version": "5.1.5.0"
      }
    ]
  }
]

Social References

More

CVSS3

5.9

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

AI Score

5.6

Confidence

High

EPSS

0

Percentile

12.6%

Related for CVE-2022-38699