The Netskope client service running with NT\SYSTEM privileges accepts network connections from localhost to start various services and execute commands. The connection handling function of Netskope client before R100 in this service utilized a relative path to download and unzip configuration files on the machine. This relative path provided a way for local users to write arbitrary files at a location which is accessible to only higher privileged users. This can be exploited by local users to execute code with NT\SYSTEM privileges on the end machine.
Metrics
Affected Vendors & Products
References
History
Thu, 22 Aug 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-20 |
Thu, 22 Aug 2024 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Netskope client service running with NT\SYSTEM privileges accepts network connections from localhost to start various services and execute commands. The connection handling function of Netskope client before R100 in this service utilized a relative path to download and unzip configuration files on the machine. This relative path provided a way for local users to write arbitrary files at a location which is accessible to only higher privileged users. This can be exploited by local users to execute code with NT\SYSTEM privileges on the end machine. | The Netskope client service running with NT\SYSTEM privileges accepts network connections from localhost to start various services and execute commands. The connection handling function of Netskope client before R100 in this service utilized a relative path to download and unzip configuration files on the machine. This relative path provided a way for local users to write arbitrary files at a location which is accessible to only higher privileged users. This can be exploited by local users to execute code with NT\SYSTEM privileges on the end machine. |
MITRE
Status: PUBLISHED
Assigner: Netskope
Published: 2023-06-15T04:29:55.133Z
Updated: 2024-08-28T20:30:16.499Z
Reserved: 2023-04-25T05:16:46.270Z
Link: CVE-2023-2270
Vulnrichment
Updated: 2024-08-02T06:19:14.091Z
NVD
Status : Modified
Published: 2023-06-15T05:15:09.773
Modified: 2024-11-21T07:58:16.910
Link: CVE-2023-2270
Redhat
No data.