When the directory containing the installer does not have sufficiently restrictive file permissions, an attacker can modify (or replace) the installer to execute malicious code.
History

Tue, 03 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Arm

Published: 2023-07-27T21:47:25.882Z

Updated: 2024-12-03T15:24:49.493Z

Reserved: 2022-10-24T04:30:23.044Z

Link: CVE-2022-43702

cve-icon Vulnrichment

Updated: 2024-08-03T13:40:06.130Z

cve-icon NVD

Status : Modified

Published: 2023-07-27T22:15:12.697

Modified: 2024-11-21T07:27:05.167

Link: CVE-2022-43702

cve-icon Redhat

No data.