When the installation directory does not have sufficiently restrictive file permissions, an attacker can modify files in the installation directory to cause execution of malicious code.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Arm
Published: 2023-07-27T21:28:08.461Z
Updated: 2023-07-27T21:32:32.256Z
Reserved: 2022-10-24T04:30:23.044Z
Link: CVE-2022-43701
JSON object: View
NVD Information
Status : Modified
Published: 2023-07-27T22:15:10.077
Modified: 2024-02-13T20:15:51.213
Link: CVE-2022-43701
JSON object: View
Redhat Information
No data.
CWE