Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:asus:armoury_crate:*:*:*:*:*:*:*:*", "matchCriteriaId": "15E195AD-C257-44D8-BF03-35DF7B4E1093", "versionEndIncluding": "5.3.4.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:asus:setupasusservices:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4B49657-7E92-47A4-BBF5-F56BD3E9E9F5", "versionEndIncluding": "1.0.5.1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "ASUS SetupAsusServices v1.0.5.1 in Asus Armoury Crate v5.3.4.0 contains an unquoted service path vulnerability which allows local users to launch processes with elevated privileges."}], "id": "CVE-2023-26911", "lastModified": "2024-11-21T07:52:02.973", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-07-26T14:15:10.283", "references": [{"source": "cve@mitre.org", "tags": ["Product"], "url": "http://asus.com"}, {"source": "cve@mitre.org", "tags": ["Product"], "url": "http://setupasusservices.com"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://irradiate.com.au/blog/CVE-2023-26911"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"], "url": "http://asus.com"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"], "url": "http://setupasusservices.com"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://irradiate.com.au/blog/CVE-2023-26911"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-428"}], "source": "nvd@nist.gov", "type": "Primary"}]}