Products
Automation Manager
- 2.91.0.0
Source
cve-coordination@google.com
Tags
CVE-2023-37244 details
Published : May 2, 2024, 2:15 p.m.
Last Modified : May 2, 2024, 6 p.m.
Last Modified : May 2, 2024, 6 p.m.
Description
The affected AutomationManager.AgentService.exe application contains a TOCTOU race condition vulnerability that allows standard users to create a pseudo-symlink at C:\ProgramData\N-Able Technologies\AutomationManager\Temp, which could be leveraged by an attacker to manipulate the process into performing arbitrary file deletions. We recommend upgrading to version 2.91.0.0
CVSS Score
1 | 2 | 3 | 4 | 5.3 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
Base Score
5.3
Exploitability Score
Impact Score
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
References
URL | Source |
---|---|
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0016.md | cve-coordination@google.com |
This website uses the NVD API, but is not approved or certified by it.