CVE-2023-28141

An NTFS Junction condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.8.0.31. Attackers may write files to arbitrary locations via a local attack vector. This allows attackers to assume the privileges of the process, and they may delete or otherwise on unauthorized files, allowing for the potential modification or deletion of sensitive files limited only to that specific directory/file object. This vulnerability is bounded to the time of installation/uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.
References
Link Resource
https://www.qualys.com/security-advisories/ Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:qualys:cloud_agent:*:*:*:*:*:windows:*:*

History

28 Apr 2023, 14:04

Type Values Removed Values Added
References (MISC) https://www.qualys.com/security-advisories/ - (MISC) https://www.qualys.com/security-advisories/ - Vendor Advisory
CPE cpe:2.3:a:qualys:cloud_agent:*:*:*:*:*:windows:*:*
First Time Qualys cloud Agent
Qualys
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.3

19 Apr 2023, 18:15

Type Values Removed Values Added
Summary An NTFS Junction condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.8.0.31. Attackers may write files to arbitrary locations via a local attack vector. This allows attackers to assume the privileges of the process, and they may delete or otherwise on unauthorized files, allowing for the potential modification or deletion of sensitive files limited only to that specific directory/file object. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life. An NTFS Junction condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.8.0.31. Attackers may write files to arbitrary locations via a local attack vector. This allows attackers to assume the privileges of the process, and they may delete or otherwise on unauthorized files, allowing for the potential modification or deletion of sensitive files limited only to that specific directory/file object. This vulnerability is bounded to the time of installation/uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.

18 Apr 2023, 18:15

Type Values Removed Values Added
Summary An NTFS Junction condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.5.3.1. Attackers may write files to arbitrary locations via a local attack vector. This allows attackers to assume the privileges of the process, and they may delete or otherwise on unauthorized files, allowing for the potential modification or deletion of sensitive files limited only to that specific directory/file object. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life. An NTFS Junction condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.8.0.31. Attackers may write files to arbitrary locations via a local attack vector. This allows attackers to assume the privileges of the process, and they may delete or otherwise on unauthorized files, allowing for the potential modification or deletion of sensitive files limited only to that specific directory/file object. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.

18 Apr 2023, 17:36

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-18 16:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-28141

Mitre link : CVE-2023-28141

CVE.ORG link : CVE-2023-28141


JSON object : View

Products Affected

qualys

  • cloud_agent
CWE
NVD-CWE-noinfo CWE-59

Improper Link Resolution Before File Access ('Link Following')