When the installation directory does not have sufficiently restrictive file permissions, an attacker can modify files in the installation directory to cause execution of malicious code.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Arm
Published: 2023-07-27T21:28:08.461Z
Updated: 2024-08-03T13:40:06.204Z
Reserved: 2022-10-24T04:30:23.044Z
Link: CVE-2022-43701
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-07-27T22:15:10.077
Modified: 2024-02-13T20:15:51.213
Link: CVE-2022-43701
Redhat
No data.