Description
The Netskope client service running with NT\SYSTEM privileges accepts network connections from localhost to start various services and execute commands. The connection handling function of Netskope client before R100 in this service utilized a relative path to download and unzip configuration files on the machine. This relative path provided a way for local users to write arbitrary files at a location which is accessible to only higher privileged users. This can be exploited by local users to execute code with NT\SYSTEM privileges on the end machine.
Published: 2023-06-15
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade netskope client to R100 and above.


Vendor Workaround

Enable Netskope client hardening  listed here -   https://docs.netskope.com/en/netskope-client-hardening.html

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-33776 The Netskope client service running with NT\SYSTEM privileges accepts network connections from localhost to start various services and execute commands. The connection handling function of Netskope client before R100 in this service utilized a relative path to download and unzip configuration files on the machine. This relative path provided a way for local users to write arbitrary files at a location which is accessible to only higher privileged users. This can be exploited by local users to execute code with NT\SYSTEM privileges on the end machine.
History

Thu, 22 Aug 2024 13:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Thu, 22 Aug 2024 12:45:00 +0000

Type Values Removed Values Added
Description The Netskope client service running with NT\SYSTEM privileges accepts network connections from localhost to start various services and execute commands. The connection handling function of Netskope client before R100 in this service utilized a relative path to download and unzip configuration files on the machine. This relative path provided a way for local users to write arbitrary files at a location which is accessible to only higher privileged users. This can be exploited by local users to execute code with NT\SYSTEM privileges on the end machine. The Netskope client service running with NT\SYSTEM privileges accepts network connections from localhost to start various services and execute commands. The connection handling function of Netskope client before R100 in this service utilized a relative path to download and unzip configuration files on the machine. This relative path provided a way for local users to write arbitrary files at a location which is accessible to only higher privileged users. This can be exploited by local users to execute code with NT\SYSTEM privileges on the end machine.

Subscriptions

Microsoft Windows
Netskope Netskope
cve-icon MITRE

Status: PUBLISHED

Assigner: Netskope

Published:

Updated: 2024-08-28T20:30:16.499Z

Reserved: 2023-04-25T05:16:46.270Z

Link: CVE-2023-2270

cve-icon Vulnrichment

Updated: 2024-08-02T06:19:14.091Z

cve-icon NVD

Status : Modified

Published: 2023-06-15T05:15:09.773

Modified: 2024-11-21T07:58:16.910

Link: CVE-2023-2270

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses