When the directory containing the installer does not have sufficiently restrictive file permissions, an attacker can modify (or replace) the installer to execute malicious code.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Arm
Published: 2023-07-27T21:47:25.882Z
Updated: 2024-08-03T13:40:06.130Z
Reserved: 2022-10-24T04:30:23.044Z
Link: CVE-2022-43702
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-07-27T22:15:12.697
Modified: 2024-02-13T20:15:51.373
Link: CVE-2022-43702
Redhat
No data.