CVE-2023-28143 Vulnerability Details

  /     /     /  

CVE-2023-28143 Metadata Quick Info

CVE Published: 18/04/2023 | CVE Updated: 02/08/2024 | CVE Year: 2023
Source: Qualys | Vendor: Qualys | Product: Cloud Agent
Status : PUBLISHED

CVE-2023-28143 Description

Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7) installer allows a local escalation of privilege bounded only to the time of installation and only on older macOSX (macOS 10.15 and older) versions. Attackers may exploit incorrect file permissions to give them ROOT command execution privileges on the host. During the install of the PKG, a step in the process involves extracting the package and copying files to several directories. Attackers may gain writable access to files during the install of PKG when extraction of the package and copying files to several directories, enabling a local escalation of privilege.

Metrics

CVSS Version: 3.1 | Base Score: 6.7 MEDIUM
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

l➤ Exploitability Metrics:
    Attack Vector (AV)* LOCAL
    Attack Complexity (AC)* HIGH
    Privileges Required (PR)* LOW
    User Interaction (UI)* REQUIRED
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* HIGH
    Availability Impact (A)* HIGH

Weakness Enumeration (CWE)

CWE-ID: CWE-426
CWE Name: CWE-426 Untrusted Search Path
Source: Qualys

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-30
CAPEC Description: CAPEC-30 Hijacking a Privileged Thread of Execution


Source: NVD (National Vulnerability Database).