Description
A vulnerability was found in KylinSoft kylin-activation on KylinOS and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260.
Published: 2023-03-03
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-23446 A vulnerability was found in KylinSoft kylin-activation on KylinOS and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260.
History

Mon, 25 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Kylinos Kylin Os
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2024-11-25T15:27:39.258Z

Reserved: 2023-03-03T06:54:45.992Z

Link: CVE-2023-1164

cve-icon Vulnrichment

Updated: 2024-08-02T05:40:58.182Z

cve-icon NVD

Status : Modified

Published: 2023-03-03T07:15:09.370

Modified: 2024-11-21T07:38:35.230

Link: CVE-2023-1164

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses