2023-10-29 09:06:41 +00:00
{
"id" : "CVE-2023-45883" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-10-19T13:15:10.447" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:27:33.260" ,
2024-09-12 20:03:17 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-10-29 09:06:41 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A privilege escalation vulnerability exists within the Qumu Multicast Extension v2 before 2.0.63 for Windows. When a standard user triggers a repair of the software, a pop-up window opens with SYSTEM privileges. Standard users may use this to gain arbitrary code execution as SYSTEM."
} ,
{
"lang" : "es" ,
"value" : "Existe una vulnerabilidad de escalada de privilegios en Qumu Multicast Extension v2 anterior a 2.0.63 para Windows. Cuando un usuario est\u00e1ndar inicia una reparaci\u00f3n del software, se abre una ventana emergente con privilegios de SYSTEM. Los usuarios est\u00e1ndar pueden usar esto para obtener la ejecuci\u00f3n de c\u00f3digo arbitrario como SYSTEM."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
2023-10-29 09:06:41 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-10-29 09:06:41 +00:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
2024-09-12 20:03:17 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-269"
}
]
2023-10-29 09:06:41 +00:00
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:enghouse:qumu:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.0.0" ,
"versionEndExcluding" : "2.0.63" ,
"matchCriteriaId" : "1C995409-E387-4294-A583-9CC33321F536"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://hackandpwn.com/disclosures/CVE-2023-45883.pdf" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.vidyo.com/enterprise-video-management/qumu" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Product"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://hackandpwn.com/disclosures/CVE-2023-45883.pdf" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.vidyo.com/enterprise-video-management/qumu" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Product"
]
2023-10-29 09:06:41 +00:00
}
]
}