CVE-2023-45160

In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch. Resolution: This has been fixed in patch Q23094  This issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site. Customers with Mac Client versions higher than v8.1 will need to upgrade to v23.11 to remediate this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:1e:client:8.1.2.62:*:*:*:*:windows:*:*
cpe:2.3:a:1e:client:8.4.1.159:*:*:*:*:windows:*:*
cpe:2.3:a:1e:client:9.0.1.88:*:*:*:*:windows:*:*
cpe:2.3:a:1e:client:23.7.1.151:*:*:*:*:windows:*:*

History

No history.

Information

Published : 2023-10-05 16:15

Updated : 2023-11-02 10:15


NVD link : CVE-2023-45160

Mitre link : CVE-2023-45160

CVE.ORG link : CVE-2023-45160


JSON object : View

Products Affected

1e

  • client
CWE
CWE-552

Files or Directories Accessible to External Parties