cvelist/2023/24xxx/CVE-2023-24491.json

89 lines
3.0 KiB
JSON
Raw Normal View History

2023-01-26 21:06:49 +00:00
{
2023-07-11 22:00:37 +00:00
"data_version": "4.0",
2023-01-26 21:06:49 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-24491",
2023-07-11 22:00:37 +00:00
"ASSIGNER": "secure@citrix.com",
"STATE": "PUBLIC"
2023-01-26 21:06:49 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-07-11 22:00:37 +00:00
"value": "\nA vulnerability has been discovered in the Citrix Secure Access client for Windows\n\n\n\nwhich, if exploited, could allow an attacker with access to an endpoint with Standard User Account that has the vulnerable client installed to escalate their local privileges to that of\u00a0NT AUTHORITY\\SYSTEM.\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-269",
"cweId": "CWE-269"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Citrix",
"product": {
"product_data": [
{
"product_name": "Citrix Secure Access client for Windows",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "23.5.1.3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://support.citrix.com/article/CTX561480/citrix-secure-access-client-for-windows-security-bulletin-for-cve202324491",
"refsource": "MISC",
"name": "https://support.citrix.com/article/CTX561480/citrix-secure-access-client-for-windows-security-bulletin-for-cve202324491"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2023-01-26 21:06:49 +00:00
}
]
}
}