Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7)
installer allows a local escalation of privilege bounded only to the time of
installation and only on older macOSX (macOS 10.15 and older) versions.
Attackers may exploit incorrect file permissions to give them ROOT command
execution privileges on the host. During the install of the PKG, a step in the
process involves extracting the package and copying files to several
directories. Attackers may gain writable access to files during the install of
PKG when extraction of the package and copying files to several directories,
enabling a local escalation of privilege.
References
Link | Resource |
---|---|
https://qualys.com/security-advisories | Vendor Advisory |
https://qualys.com/security-advisories | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:54
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
References | () https://qualys.com/security-advisories - Vendor Advisory |
Information
Published : 2023-04-18 16:15
Updated : 2024-11-21 07:54
NVD link : CVE-2023-28143
Mitre link : CVE-2023-28143
CVE.ORG link : CVE-2023-28143
JSON object : View
Products Affected
qualys
- cloud_agent
apple
- mac_os_x
CWE
CWE-426
Untrusted Search Path