An issue discovered in TheGreenBow Windows Enterprise Certified VPN Client 6.52, Windows Standard VPN Client 6.87, and Windows Enterprise VPN Client 6.87 allows attackers to gain escalated privileges via crafted changes to memory mapped file.
References
Link | Resource |
---|---|
https://www.thegreenbow.com/en/support/security-alerts/#deeplink-16093 | Vendor Advisory |
Configurations
History
29 Dec 2023, 03:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.thegreenbow.com/en/support/security-alerts/#deeplink-16093 - Vendor Advisory | |
CPE | cpe:2.3:a:thegreenbow:windows_enterprise_certified_vpn:6.52:*:*:*:*:*:*:* cpe:2.3:a:thegreenbow:windows_enterprise_vpn:6.87:*:*:*:*:*:*:* cpe:2.3:a:thegreenbow:windows_standard_vpn:6.87:*:*:*:*:*:*:* |
|
CWE | CWE-269 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
20 Dec 2023, 13:50
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-19 22:15
Updated : 2024-02-05 00:22
NVD link : CVE-2023-47267
Mitre link : CVE-2023-47267
CVE.ORG link : CVE-2023-47267
JSON object : View
Products Affected
thegreenbow
- windows_enterprise_certified_vpn
- windows_enterprise_vpn
- windows_standard_vpn
CWE
CWE-269
Improper Privilege Management