← Zuruck zu CVEs
CVE-2023-45161
CRITICAL9.9
Beschreibung
The 1E-Exchange-URLResponseTime instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the URL parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients. To remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-URLResponseTime instruction to v20.1 by uploading it through the 1E Platform instruction upload UI
CVE Details
CVSS v3.1 Bewertung9.9
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht11/6/2023
Zuletzt geandert6/12/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
1e:platform
Schwachen (CWE)
CWE-20
Referenzen
https://exchange.1e.com/product-packs/network/(security@1e.com)
https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2003/(security@1e.com)
https://exchange.1e.com/product-packs/network/(af854a3a-2127-422b-91ae-364da2661108)
https://www.1e.com/trust-security-compliance/cve-info/(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.