Impact
The vulnerability allows an assailant with local access to gain unnecessary privileges in the Forcepoint NGFW Engine. The flaw enables a local privilege escalation that could lead to elevated permissions, potentially giving the attacker full control over the system’s configuration, monitoring, and management functions. This is a direct impact on confidentiality, integrity, and availability of the device and any networks it protects.
Affected Systems
Affected products include Forcepoint NGFW Engine. Versions affected are all releases up to 6.10.19, 7.1.10, 7.2.4, and 7.3.0, as indicated by the vendor’s reference list.
Risk and Exploitability
The CVSS score of 7.3 classifies it as a high‑severity flaw, but the EPSS score of less than 1% suggests a low probability of exploitation in the wild. Since the vulnerability requires local access, the attack vector is local, limiting exposure to the device’s operator or someone physically present. The flaw is not listed in the CISA KEV catalog. Exploitation would require a user with read‑write access to the engine’s working directory or ability to place tampered configuration files; once executed, the attacker could gain root or administrator privileges on the device.
OpenCVE Enrichment