cve/2023/CVE-2023-31468.md

21 lines
1011 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-31468](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31468)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
2024-06-07 04:52:01 +00:00
An issue was discovered in Inosoft VisiWin 7 through 2022-2.1 (Runtime RT7.3 RC3 20221209.5). The "%PROGRAMFILES(X86)%\INOSOFT GmbH" folder has weak permissions for Everyone, allowing an attacker to insert a Trojan horse file that runs as SYSTEM. 2024-1 is a fixed version.
2024-05-25 21:48:12 +02:00
### POC
#### Reference
- http://packetstormsecurity.com/files/174268/Inosoft-VisiWin-7-2022-2.1-Insecure-Permissions-Privilege-Escalation.html
2024-06-07 17:53:02 +00:00
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-03
2024-05-25 21:48:12 +02:00
- https://www.exploit-db.com/exploits/51682
2024-06-07 17:53:02 +00:00
- https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.