cve/2023/CVE-2023-31468.md

19 lines
830 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-31468](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31468)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in Inosoft VisiWin 7 through 2022-2.1 (Runtime RT7.3 RC3 20221209.5). The "%PROGRAMFILES(X86)%\INOSOFT GmbH" folder has weak permissions for Everyone, allowing an attacker to insert a Trojan horse file that runs as SYSTEM.
### POC
#### Reference
- http://packetstormsecurity.com/files/174268/Inosoft-VisiWin-7-2022-2.1-Insecure-Permissions-Privilege-Escalation.html
- https://www.exploit-db.com/exploits/51682
#### Github
No PoCs found on GitHub currently.