CVE-2023-28140

An Executable Hijacking condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.5.3.1. Attackers may load a malicious copy of a Dependency Link Library (DLL) via a local attack vector instead of the DLL that the application was expecting, when processes are running with escalated privileges. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:qualys:cloud_agent:*:*:*:*:*:windows:*:*

History

21 Nov 2024, 07:54

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.0
v2 : unknown
v3 : 6.7
References () https://www.qualys.com/security-advisories/ - Vendor Advisory () https://www.qualys.com/security-advisories/ - Vendor Advisory

28 Apr 2023, 13:52

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0
CWE CWE-427
CPE cpe:2.3:a:qualys:cloud_agent:*:*:*:*:*:windows:*:*
References (MISC) https://www.qualys.com/security-advisories/ - (MISC) https://www.qualys.com/security-advisories/ - Vendor Advisory

18 Apr 2023, 17:36

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-18 16:15

Updated : 2024-11-21 07:54


NVD link : CVE-2023-28140

Mitre link : CVE-2023-28140

CVE.ORG link : CVE-2023-28140


JSON object : View

Products Affected

qualys

  • cloud_agent
CWE
CWE-427

Uncontrolled Search Path Element