Vulnerability Details : CVE-2023-5937
On Windows systems, the Arc configuration files resulted to be world-readable.
This can lead to information disclosure by local attackers, via exfiltration of sensitive data from configuration files.
Vulnerability category: Information leak
Products affected by CVE-2023-5937
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-5937
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 7 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-5937
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.8
|
LOW | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N |
2.0
|
1.4
|
Nozomi Networks Inc. | 2024-05-15 |
5.2
|
MEDIUM | CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/V... |
N/A
|
N/A
|
Nozomi Networks Inc. | 2024-09-20 |
CWE ids for CVE-2023-5937
-
The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.Assigned by: prodsec@nozominetworks.com (Secondary)
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by: prodsec@nozominetworks.com (Secondary)
References for CVE-2023-5937
-
https://security.nozominetworks.com/NN-2023:15-01
NN-2023:15-01 - Sensitive data exfiltration via unsafe permissions on Windows systems in Arc before v1.6.0 - CVE-2023-5937 | Product Security Incident Response Portal
Jump to