CVE-2023-45163

The 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients. To remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI
Configurations

Configuration 1 (hide)

cpe:2.3:a:1e:platform:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.2
v2 : unknown
v3 : 9.9
References () https://https://exchange.1e.com/product-packs/network/ - Product () https://https://exchange.1e.com/product-packs/network/ - Product
References () https://www.1e.com/trust-security-compliance/cve-info/ - Vendor Advisory () https://www.1e.com/trust-security-compliance/cve-info/ - Vendor Advisory

21 Nov 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-06 13:15

Updated : 2024-11-21 08:26


NVD link : CVE-2023-45163

Mitre link : CVE-2023-45163

CVE.ORG link : CVE-2023-45163


JSON object : View

Products Affected

1e

  • platform
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo