CVE-2023-47267

An issue discovered in TheGreenBow Windows Enterprise Certified VPN Client 6.52, Windows Standard VPN Client 6.87, and Windows Enterprise VPN Client 6.87 allows attackers to gain escalated privileges via crafted changes to memory mapped file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:thegreenbow:windows_enterprise_certified_vpn:6.52:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:thegreenbow:windows_standard_vpn:6.87:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:thegreenbow:windows_enterprise_vpn:6.87:*:*:*:*:*:*:*

History

21 Nov 2024, 08:30

Type Values Removed Values Added
References () https://www.thegreenbow.com/en/support/security-alerts/#deeplink-16093 - Vendor Advisory () https://www.thegreenbow.com/en/support/security-alerts/#deeplink-16093 - Vendor Advisory

29 Dec 2023, 03:11

Type Values Removed Values Added
References () https://www.thegreenbow.com/en/support/security-alerts/#deeplink-16093 - () https://www.thegreenbow.com/en/support/security-alerts/#deeplink-16093 - Vendor Advisory
First Time Thegreenbow windows Enterprise Certified Vpn
Thegreenbow windows Standard Vpn
Thegreenbow windows Enterprise Vpn
Thegreenbow
CWE CWE-269
CPE cpe:2.3:a:thegreenbow:windows_enterprise_vpn:6.87:*:*:*:*:*:*:*
cpe:2.3:a:thegreenbow:windows_enterprise_certified_vpn:6.52:*:*:*:*:*:*:*
cpe:2.3:a:thegreenbow:windows_standard_vpn:6.87:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

20 Dec 2023, 13:50

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-19 22:15

Updated : 2024-11-21 08:30


NVD link : CVE-2023-47267

Mitre link : CVE-2023-47267

CVE.ORG link : CVE-2023-47267


JSON object : View

Products Affected

thegreenbow

  • windows_standard_vpn
  • windows_enterprise_vpn
  • windows_enterprise_certified_vpn
CWE
CWE-269

Improper Privilege Management