Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-54826 | Netskope was made aware of a security vulnerability in its NSClient product for version 100 & prior where a malicious non-admin user can disable the Netskope client by using a specially-crafted package. The root cause of the problem was a user control code when called by a Windows ServiceController did not validate the permissions associated with the user before executing the user control code. This user control code had permissions to terminate the NSClient service. |
Solution
Netskope patched the issue and released a new version. The issue was fixed in Release101. Customers are recommended to upgrade their client to the versions R101 or greater. Netskope download Instructions – Download Netskope Client and Scripts – Netskope Support https://support.netskope.com/s/article/Download-Netskope-Client-and-Scripts
Workaround
No workaround given by the vendor.
No history.

Status: PUBLISHED
Assigner: Netskope
Published:
Updated: 2024-09-05T15:19:00.692Z
Reserved: 2023-09-15T12:39:38.532Z
Link: CVE-2023-4996

Updated: 2024-08-02T07:44:53.768Z

Status : Modified
Published: 2023-11-06T11:15:09.593
Modified: 2024-11-21T08:36:25.640
Link: CVE-2023-4996

No data.

No data.