In Keysight Geolocation Server v2.4.2 and prior, an attacker could upload a specially crafted malicious file or delete any file or directory with SYSTEM privileges due to an improper path validation, which could result in local privilege escalation or a denial-of-service condition.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-38474 | In Keysight Geolocation Server v2.4.2 and prior, an attacker could upload a specially crafted malicious file or delete any file or directory with SYSTEM privileges due to an improper path validation, which could result in local privilege escalation or a denial-of-service condition. |
Solution
​Keysight recommends upgrading the N6854A Geolocation server to version 2.4.3 https://www.keysight.com/us/en/lib/software-detail/computer-software/n6854a-geolocation-server-and-n6841a-rf-sensor-software-sw319.html .
Workaround
No workaround given by the vendor.
Mon, 28 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-10-28T14:19:36.758Z
Reserved: 2023-07-13T18:01:11.679Z
Link: CVE-2023-34394

Updated: 2024-08-02T16:10:06.752Z

Status : Modified
Published: 2023-07-19T22:15:10.983
Modified: 2024-11-21T08:07:09.990
Link: CVE-2023-34394

No data.

No data.