assignment to critical directories vulnerability, which could allow a
local user to escalate privileges and write files to the RoboDK process
and achieve code execution.
No analysis available yet.
Vendor Workaround
RoboDK has not responded to requests to work with CISA to mitigate this vulnerability. Users of the affected product are encouraged to contact RoboDK support for additional information.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23762 | RoboDK versions 5.5.3 and prior contain an insecure permission assignment to critical directories vulnerability, which could allow a local user to escalate privileges and write files to the RoboDK process and achieve code execution. |
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:37:33.820Z
Reserved: 2023-03-20T14:20:50.559Z
Link: CVE-2023-1516
Updated: 2024-08-02T05:49:11.662Z
Status : Modified
Published: 2023-03-28T21:15:10.293
Modified: 2024-11-21T07:39:21.057
Link: CVE-2023-1516
No data.
OpenCVE Enrichment
No data.
EUVD