CVE-2023-47267

An issue discovered in TheGreenBow Windows Enterprise Certified VPN Client 6.52, Windows Standard VPN Client 6.87, and Windows Enterprise VPN Client 6.87 allows attackers to gain escalated privileges via crafted changes to memory mapped file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:thegreenbow:windows_enterprise_certified_vpn:6.52:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:thegreenbow:windows_standard_vpn:6.87:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:thegreenbow:windows_enterprise_vpn:6.87:*:*:*:*:*:*:*

History

29 Dec 2023, 03:11

Type Values Removed Values Added
References () https://www.thegreenbow.com/en/support/security-alerts/#deeplink-16093 - () https://www.thegreenbow.com/en/support/security-alerts/#deeplink-16093 - Vendor Advisory
CPE cpe:2.3:a:thegreenbow:windows_enterprise_certified_vpn:6.52:*:*:*:*:*:*:*
cpe:2.3:a:thegreenbow:windows_enterprise_vpn:6.87:*:*:*:*:*:*:*
cpe:2.3:a:thegreenbow:windows_standard_vpn:6.87:*:*:*:*:*:*:*
CWE CWE-269
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

20 Dec 2023, 13:50

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-19 22:15

Updated : 2024-02-05 00:22


NVD link : CVE-2023-47267

Mitre link : CVE-2023-47267

CVE.ORG link : CVE-2023-47267


JSON object : View

Products Affected

thegreenbow

  • windows_enterprise_certified_vpn
  • windows_enterprise_vpn
  • windows_standard_vpn
CWE
CWE-269

Improper Privilege Management