The 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.
To remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI
References
Link | Resource |
---|---|
https://https://exchange.1e.com/product-packs/network/ | Product |
https://www.1e.com/trust-security-compliance/cve-info/ | Vendor Advisory |
https://https://exchange.1e.com/product-packs/network/ | Product |
https://www.1e.com/trust-security-compliance/cve-info/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 08:26
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.9 |
References | () https://https://exchange.1e.com/product-packs/network/ - Product | |
References | () https://www.1e.com/trust-security-compliance/cve-info/ - Vendor Advisory |
21 Nov 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-06 13:15
Updated : 2024-11-21 08:26
NVD link : CVE-2023-45163
Mitre link : CVE-2023-45163
CVE.ORG link : CVE-2023-45163
JSON object : View
Products Affected
1e
- platform
CWE