Vulnerability Details : CVE-2023-2091
A vulnerability classified as critical was found in KylinSoft youker-assistant on KylinOS. Affected by this vulnerability is the function adjust_cpufreq_scaling_governer. The manipulation leads to os command injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.4.13 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-226099.
Products affected by CVE-2023-2091
- cpe:2.3:a:kylinos:youker-assistant:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-2091
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-2091
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:L/AC:L/Au:S/C:C/I:C/A:C |
3.1
|
10.0
|
VulDB | |
4.3
|
MEDIUM | AV:L/AC:L/Au:S/C:P/I:P/A:P |
3.1
|
6.4
|
VulDB | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
VulDB | |
5.3
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
1.8
|
3.4
|
VulDB | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
VulDB | 2024-02-13 |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2023-2091
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: cna@vuldb.com (Primary)
References for CVE-2023-2091
-
https://github.com/i900008/vulndb/blob/main/youker-assistant_vuln.md
vulndb/youker-assistant_vuln.md at main · i900008/vulndb · GitHubExploit;Third Party Advisory
-
https://kylinos.cn/support/loophole/patch/3375.html
跳转提示
-
https://vuldb.com/?ctiid.226099
CVE-2023-2091 | KylinSoft youker-assistant adjust_cpufreq_scaling_governer os command injectionPermissions Required;Third Party Advisory
-
https://vuldb.com/?id.226099
CVE-2023-2091 | KylinSoft youker-assistant adjust_cpufreq_scaling_governer os command injectionThird Party Advisory
Jump to