Lucene search

K
vulnrichment1EVULNRICHMENT:CVE-2023-45160
HistoryOct 05, 2023 - 3:12 p.m.

CVE-2023-45160 Elevated Temp Directory Execution in 1E Client

2023-10-0515:12:20
CWE-552
1E
github.com
1e client
vulnerability
patch
mac client
1e support site
resource files
harmful script
temporary directory
fixed
updated versions
non-windows release
remediate

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client’s temporary directory is now locked down in the released patch.

Resolution: This has been fixed in patch Q23094

This issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site.

Customers with Mac Client versions higher than v8.1 will need to upgrade to v23.11 to remediate this vulnerability.

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-45160