Vulnerability Details : CVE-2023-31068
An issue was discovered in TSplus Remote Access through 16.0.2.14. There are Full Control permissions for Everyone on some directories under %PROGRAMFILES(X86)%\TSplus\UserDesktop\themes.
Products affected by CVE-2023-31068
- cpe:2.3:a:tsplus:tsplus_remote_access:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-31068
1.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-31068
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-31068
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-31068
-
http://packetstormsecurity.com/files/174272/TSPlus-16.0.0.0-Insecure-Permissions.html
TSPlus 16.0.0.0 Insecure Permissions ≈ Packet StormThird Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/51680
TSplus 16.0.0.0 - Remote Work Insecure Files and Folders - Windows remote ExploitThird Party Advisory;VDB Entry
Jump to