NN-2023:15-01
Vulnerability from csaf_nozominetworks
Published
2024-05-15 11:00
Modified
2024-09-19 11:00
Summary
Sensitive data exfiltration via unsafe permissions on Windows systems in Arc before v1.6.0
Notes
Risk Level for Nozomi customers
Medium
{ document: { aggregate_severity: { text: "LOW", }, category: "csaf_vex", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "en-US", notes: [ { category: "other", text: "Medium", title: "Risk Level for Nozomi customers", }, ], publisher: { category: "vendor", contact_details: "Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com", name: "Nozomi Networks Product Security", namespace: "https://security.nozominetworks.com/psirt", }, title: "Sensitive data exfiltration via unsafe permissions on Windows systems in Arc before v1.6.0", tracking: { aliases: [ "CVE-2023-5937", ], current_release_date: "2024-09-19T11:00:00.000Z", id: "NN-2023:15-01", initial_release_date: "2024-05-15T11:00:00.000Z", revision_history: [ { date: "2024-05-15T11:00:00.000Z", number: "1", summary: "Initial revision", }, { date: "2024-05-20T11:00:00.000Z", number: "2", summary: "Added CVSS v4.0 scoring where applicable", }, { date: "2024-09-19T11:00:00.000Z", number: "3", summary: "Revised CWE mapping", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "vers:gem/<1.6.0", product: { name: "Nozomi Networks Arc <1.6.0", product_id: "CSAFPID-0001", }, }, { category: "product_version", name: "1.6.0", product: { name: "Nozomi Networks Arc 1.6.0", product_id: "CSAFPID-0002", }, }, ], category: "product_name", name: "Arc", }, ], category: "vendor", name: "Nozomi Networks", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Diego Giubertoni", "Gabriele Quagliarella", ], organization: "Nozomi Networks Security Research team", summary: "finding this issue during an internal penetration testing session", }, ], cve: "CVE-2023-5937", cwe: { id: "CWE-538", name: "Insertion of Sensitive Information into Externally-Accessible File or Directory", }, discovery_date: "2024-05-15T11:00:00.000Z", ids: [ { system_name: "Nozomi Networks Security Advisory ID", text: "NN-2023:15-01", }, ], notes: [ { category: "summary", text: "On Windows systems, the Arc configuration files resulted to be world-readable.", title: "Vulnerability summary", }, ], product_status: { fixed: [ "CSAFPID-0002", ], known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "Mitre CVE entry", url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5937", }, { category: "self", summary: "Canonical URL", url: "https://security.nozominetworks.com/csaf/2024/nn-2023_15-01.json", }, { category: "self", summary: "Human-readable advisory.", url: "https://security.nozominetworks.com/NN-2023:15-01", }, ], remediations: [ { category: "mitigation", details: "N/A", product_ids: [ "CSAFPID-0001", ], }, { category: "vendor_fix", details: "Upgrade to v1.6.0 or later.", product_ids: [ "CSAFPID-0001", ], }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], threats: [ { category: "impact", details: "This can lead to information disclosure by local attackers, via exfiltration of sensitive data from configuration files.", }, ], title: "Sensitive data exfiltration via unsafe permissions on Windows systems in Arc before v1.6.0", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.