CVE-2023-28140

An Executable Hijacking condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.5.3.1. Attackers may load a malicious copy of a Dependency Link Library (DLL) via a local attack vector instead of the DLL that the application was expecting, when processes are running with escalated privileges. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.
References
Link Resource
https://www.qualys.com/security-advisories/ Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:qualys:cloud_agent:*:*:*:*:*:windows:*:*

History

28 Apr 2023, 13:52

Type Values Removed Values Added
CPE cpe:2.3:a:qualys:cloud_agent:*:*:*:*:*:windows:*:*
References (MISC) https://www.qualys.com/security-advisories/ - (MISC) https://www.qualys.com/security-advisories/ - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0
CWE CWE-427
First Time Qualys cloud Agent
Qualys

18 Apr 2023, 17:36

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-18 16:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-28140

Mitre link : CVE-2023-28140

CVE.ORG link : CVE-2023-28140


JSON object : View

Products Affected

qualys

  • cloud_agent
CWE
CWE-427

Uncontrolled Search Path Element