A logged in user can modify specific files that may lead to unauthorized changes in system-wide configuration settings. This vulnerability could be exploited to compromise the integrity and security of the network on the affected system.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-08-29T17:18:34.932Z

Reserved: 2023-07-20T01:00:12.443Z

Link: CVE-2023-38544

cve-icon Vulnrichment

Updated: 2024-08-02T17:46:55.653Z

cve-icon NVD

Status : Modified

Published: 2023-11-15T00:15:08.237

Modified: 2024-11-21T08:13:47.867

Link: CVE-2023-38544

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.