When the directory containing the installer does not have sufficiently restrictive file permissions, an attacker can modify (or replace) the installer to execute malicious code.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Arm

Published: 2023-07-27T21:47:25.882Z

Updated: 2024-08-03T13:40:06.130Z

Reserved: 2022-10-24T04:30:23.044Z

Link: CVE-2022-43702

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-07-27T22:15:12.697

Modified: 2024-02-13T20:15:51.373

Link: CVE-2022-43702

cve-icon Redhat

No data.