CVE-2023-2270 Vulnerability Details

  /     /     /  

CVE-2023-2270 Metadata Quick Info

CVE Published: 15/06/2023 | CVE Updated: 28/08/2024 | CVE Year: 2023
Source: Netskope | Vendor: Netskope | Product: Netskope Client
Status : PUBLISHED

CVE-2023-2270 Description

The Netskope client service running with NT\SYSTEM privileges accepts network connections from localhost to start various services and execute commands. The connection handling function of Netskope client before R100 in this service utilized a relative path to download and unzip configuration files on the machine. This relative path provided a way for local users to write arbitrary files at a location which is accessible to only higher privileged users. This can be exploited by local users to execute code with NT\SYSTEM privileges on the end machine.

Metrics

CVSS Version: 3.1 | Base Score: 7 HIGH
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

l➤ Exploitability Metrics:
    Attack Vector (AV)* LOCAL
    Attack Complexity (AC)* HIGH
    Privileges Required (PR)* LOW
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* HIGH
    Availability Impact (A)* HIGH

Weakness Enumeration (CWE)

CWE-ID: CWE-22
CWE Name: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ( Path Traversal )
Source: Netskope

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-234
CAPEC Description: CAPEC-234 Hijacking a privileged process


Source: NVD (National Vulnerability Database).