When the installation directory does not have sufficiently restrictive file permissions, an attacker can modify files in the installation directory to cause execution of malicious code.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: Arm

Published: 2023-07-27T21:28:08.461Z

Updated: 2023-07-27T21:32:32.256Z

Reserved: 2022-10-24T04:30:23.044Z


Link: CVE-2022-43701

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-07-27T22:15:10.077

Modified: 2024-02-13T20:15:51.213


Link: CVE-2022-43701

JSON object: View

cve-icon Redhat Information

No data.

CWE