Chef InSpec up to version 5.23 creates named pipes with overly permissive default Windows access controls. A local attacker may interfere with the pipe connection process and exploit the insufficient access restrictions to assume the InSpec execution context, potentially resulting in elevated privileges or operational disruption.
This issue affects Chef Inspec: through 5.23.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://docs.chef.io/inspec/ |
|
History
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chef
Chef inspec |
|
| Vendors & Products |
Chef
Chef inspec |
Fri, 30 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chef InSpec up to version 5.23 creates named pipes with overly permissive default Windows access controls. A local attacker may interfere with the pipe connection process and exploit the insufficient access restrictions to assume the InSpec execution context, potentially resulting in elevated privileges or operational disruption. This issue affects Chef Inspec: through 5.23. | |
| Title | Untrusted user data can lead to privilege escalation | |
| Weaknesses | CWE-269 CWE-287 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ProgressSoftware
Published: 2026-01-30T14:09:41.182Z
Updated: 2026-01-30T14:44:30.165Z
Reserved: 2025-06-26T14:24:52.468Z
Link: CVE-2025-6723
Updated: 2026-01-30T14:44:20.194Z
Status : Received
Published: 2026-01-30T14:16:06.510
Modified: 2026-01-30T14:16:06.510
Link: CVE-2025-6723
No data.
ReportizFlow