← Retour aux CVEs
CVE-2023-45163
CRITICAL9.9
Description
The 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients. To remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI
Details CVE
Score CVSS v3.19.9
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie11/6/2023
Derniere modification6/12/2025
Sourcenvd
Observations honeypot0
Produits affectes
1e:platform
Faiblesses (CWE)
CWE-20
References
https://exchange.1e.com/product-packs/network/(security@1e.com)
https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2005/(security@1e.com)
https://https://exchange.1e.com/product-packs/network/(af854a3a-2127-422b-91ae-364da2661108)
https://www.1e.com/trust-security-compliance/cve-info/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.