Advisory ID: | Q-PVD-2023-03 |
CVE ID: | CVE-2023-28143 |
QID: | 378361 |
Published: | 2023-04-18 |
CWE: | CWE-362 |
NVD Risk Rating | Qualys Risk Rating | |
CVSSv3.1 Score | TBD | 6.7 / Medium |
CVSSv3.1 Vector (Base) | TBD | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7) installer allows a local escalation of privilege bounded only to the time of installation and only on older macOSX (macOS 10.15 and older) versions. Attackers may exploit incorrect file permissions to give them ROOT command execution privileges on the host. During the install of the PKG, a step in the process involves extracting the package and copying files to several directories. Attackers may gain writable access to files during the install of PKG when extraction of the package and copying files to several directories, enabling a local escalation of privilege.
Customers are advised to upgrade to v3.7 or higher of Qualys Cloud Agent for MacOS. If possible, customers should enable automatic updates.
Qualys has assessed the exploit and believes the risk to be low for the following reasons:
Lockheed Martin Red Team