Description
NNM failed to properly set ACLs on its installation directory, which could allow a low privileged user to run arbitrary code with SYSTEM privileges where NNM is installed to a non-standard location
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-57916 | NNM failed to properly set ACLs on its installation directory, which could allow a low privileged user to run arbitrary code with SYSTEM privileges where NNM is installed to a non-standard location |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2023-34 |
|
History
Mon, 09 Sep 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-276 |
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-09-09T15:50:01.791Z
Reserved: 2023-10-17T19:03:43.341Z
Link: CVE-2023-5623
Updated: 2024-08-02T08:07:32.253Z
Status : Modified
Published: 2023-10-26T17:15:09.860
Modified: 2024-11-21T08:42:08.350
Link: CVE-2023-5623
No data.
OpenCVE Enrichment
No data.
EUVD