Vulnerability Details : CVE-2023-28143
Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7)
installer allows a local escalation of privilege bounded only to the time of
installation and only on older macOSX (macOS 10.15 and older) versions.
Attackers may exploit incorrect file permissions to give them ROOT command
execution privileges on the host. During the install of the PKG, a step in the
process involves extracting the package and copying files to several
directories. Attackers may gain writable access to files during the install of
PKG when extraction of the package and copying files to several directories,
enabling a local escalation of privilege.
Vulnerability category: File inclusion
Products affected by CVE-2023-28143
- cpe:2.3:a:qualys:cloud_agent:*:*:*:*:*:macos:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-28143
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-28143
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.7
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
0.8
|
5.9
|
Qualys, Inc. | |
7.0
|
HIGH | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.0
|
5.9
|
NIST |
CWE ids for CVE-2023-28143
-
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.Assigned by:
- bugreport@qualys.com (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-28143
-
https://qualys.com/security-advisories
Security Advisories | QualysVendor Advisory
Jump to