In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.
Resolution: This has been fixed in patch Q23094
This issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site.
Customers with Mac Client versions higher than v8.1 will need to upgrade to v23.11 to remediate this vulnerability.
References
Configurations
Configuration 1 (hide)
|
History
02 Nov 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch. Resolution: This has been fixed in patch Q23094 This issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site. Customers with Mac Client versions higher than v8.1 will need to upgrade to v23.11 to remediate this vulnerability. |
31 Oct 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch. Resolution: This has been fixed in patch Q23094 This issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site. v9.0 Mac client release is still pending. |
31 Oct 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch. Resolution: This has been fixed in patch Q23094 This has also been fixed in Mac Client releases v8.1.2.121 and v9.0.1.121. |
19 Oct 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch. Resolution: This has been fixed in patch Q23094 | |
References |
|
12 Oct 2023, 14:07
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.1e.com/trust-security-compliance/cve-info/ - Vendor Advisory | |
CWE | CWE-552 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
1e
1e client |
|
CPE | cpe:2.3:a:1e:client:23.7.1.151:*:*:*:*:windows:*:* cpe:2.3:a:1e:client:9.0.1.88:*:*:*:*:windows:*:* cpe:2.3:a:1e:client:8.4.1.159:*:*:*:*:windows:*:* cpe:2.3:a:1e:client:8.1.2.62:*:*:*:*:windows:*:* |
05 Oct 2023, 16:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-05 16:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-45160
Mitre link : CVE-2023-45160
CVE.ORG link : CVE-2023-45160
JSON object : View
Products Affected
1e
- client
CWE
CWE-552
Files or Directories Accessible to External Parties