NNM failed to properly set ACLs on its installation directory, which could allow a low privileged user to run arbitrary code with SYSTEM privileges where NNM is installed to a non-standard location
References
Link Resource
https://www.tenable.com/security/tns-2023-34 Patch Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: tenable

Published: 2023-10-26T16:25:17.792Z

Updated: 2023-10-26T16:25:17.792Z

Reserved: 2023-10-17T19:03:43.341Z


Link: CVE-2023-5623

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-10-26T17:15:09.860

Modified: 2023-11-07T13:49:33.017


Link: CVE-2023-5623

JSON object: View

cve-icon Redhat Information

No data.

CWE