CVE-2023-40252 Vulnerability Details

  /     /     /  

CVE-2023-40252 Metadata Quick Info

CVE Published: 17/08/2023 | CVE Updated: 01/10/2024 | CVE Year: 2023
Source: krcert | Vendor: Genians | Product: Genian NAC V4.0
Status : PUBLISHED

CVE-2023-40252 Description

Improper Control of Generation of Code (\'Code Injection\') vulnerability in Genians Genian NAC V4.0, Genians Genian NAC V5.0, Genians Genian NAC Suite V5.0, Genians Genian ZTNA allows Replace Trusted Executable.This issue affects Genian NAC V4.0: from V4.0.0 through V4.0.155; Genian NAC V5.0: from V5.0.0 through V5.0.42 (Revision 117460); Genian NAC Suite V5.0: from V5.0.0 through V5.0.54; Genian ZTNA: from V6.0.0 through V6.0.15.

Metrics

CVSS Version: 3.1 | Base Score: 6 MEDIUM
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* LOCAL
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* HIGH
    User Interaction (UI)* NONE
    Scope (S)* CHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* NONE
    Integrity Impact (I)* HIGH
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-94
CWE Name: CWE-94 Improper Control of Generation of Code ( Code Injection )
Source: Genians

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-558
CAPEC Description: CAPEC-558 Replace Trusted Executable


Source: NVD (National Vulnerability Database).