When configuring Arc (e.g. during the first setup), a local web interface is provided to ease the configuration process. Such web interface lacks authentication and may thus be abused by a local attacker or malware running on the machine itself.
A malicious local user or process, during a window of opportunity when the local web interface is active, may be able to extract sensitive information or change Arc's configuration. This could also lead to arbitrary code execution if a malicious update package is installed.
A malicious local user or process, during a window of opportunity when the local web interface is active, may be able to extract sensitive information or change Arc's configuration. This could also lead to arbitrary code execution if a malicious update package is installed.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58207 | When configuring Arc (e.g. during the first setup), a local web interface is provided to ease the configuration process. Such web interface lacks authentication and may thus be abused by a local attacker or malware running on the machine itself. A malicious local user or process, during a window of opportunity when the local web interface is active, may be able to extract sensitive information or change Arc's configuration. This could also lead to arbitrary code execution if a malicious update package is installed. |
Fixes
Solution
Upgrade to v1.6.0 or later.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://security.nozominetworks.com/NN-2023:13-01 |
|
History
No history.
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2024-08-02T08:14:25.128Z
Reserved: 2023-11-02T15:59:45.788Z
Link: CVE-2023-5935
Updated: 2024-08-02T08:14:25.128Z
Status : Awaiting Analysis
Published: 2024-05-15T16:15:09.020
Modified: 2024-11-21T08:42:48.670
Link: CVE-2023-5935
No data.
OpenCVE Enrichment
No data.
EUVD