Vulnerability Details : CVE-2023-3181
The C:\Program Files (x86)\Splashtop\Splashtop Software Updater\uninst.exe process creates a folder at C:\Windows\Temp~nsu.tmp and copies itself to it as Au_.exe. The C:\Windows\Temp~nsu.tmp\Au_.exe file is automatically launched as SYSTEM when the system reboots or when a standard user runs an MSI repair using Splashtop Streamer’s Windows Installer. Since the C:\Windows\Temp~nsu.tmp folder inherits permissions from C:\Windows\Temp and Au_.exe is susceptible to DLL hijacking, standard users can write a malicious DLL to it and elevate their privileges.
Products affected by CVE-2023-3181
- cpe:2.3:a:splashtop:software_updater:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-3181
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 7 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-3181
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
Google Inc. | 2024-01-25 |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2024-02-03 |
CWE ids for CVE-2023-3181
-
The product creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file.Assigned by: cve-coordination@google.com (Secondary)
References for CVE-2023-3181
-
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0015.md
Vulnerability-Disclosures/2023/MNDT-2023-0015.md at master · mandiant/Vulnerability-Disclosures · GitHubThird Party Advisory
Jump to