Description
Armoury Crate Service’s logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system.
No analysis available yet.
Remediation
Vendor Solution
Update Armoury Crate Service version to V5.2.10.0
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-41268 | Armoury Crate Service’s logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-6522-4eacb-1.html |
|
History
Wed, 21 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2025-05-21T14:54:16.472Z
Reserved: 2022-08-23T00:00:00.000Z
Link: CVE-2022-38699
Updated: 2024-08-03T11:02:14.548Z
Status : Modified
Published: 2022-09-28T04:15:13.857
Modified: 2024-11-21T07:16:57.307
Link: CVE-2022-38699
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD