Improper file permissions in the CommandPost, Collector, and Sensor components of Fidelis Network and Deception enables an attacker with local, administrative access to the CLI to modify affected script files, which could result in arbitrary commands being run as root upon subsequent logon by a root user. The vulnerability is present in Fidelis Network and Deception versions prior to 9.4.5. Patches and updates are available to address this vulnerability.
References
Link | Resource |
---|---|
https://fidelissecurity.zendesk.com/hc/en-us/articles/6211730139411 | Permissions Required Vendor Advisory |
https://fidelissecurity.zendesk.com/hc/en-us/articles/6211730139411 | Permissions Required Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://fidelissecurity.zendesk.com/hc/en-us/articles/6211730139411 - Permissions Required, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 3.9 |
Information
Published : 2022-05-17 20:15
Updated : 2024-11-21 06:39
NVD link : CVE-2022-0997
Mitre link : CVE-2022-0997
CVE.ORG link : CVE-2022-0997
JSON object : View
Products Affected
fidelissecurity
- network
- deception
CWE
CWE-276
Incorrect Default Permissions