This issue affects Chef Inspec: through 5.23.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://docs.chef.io/inspec/ |
|
Fri, 30 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chef InSpec up to version 5.23 creates named pipes with overly permissive default Windows access controls. A local attacker may interfere with the pipe connection process and exploit the insufficient access restrictions to assume the InSpec execution context, potentially resulting in elevated privileges or operational disruption. This issue affects Chef Inspec: through 5.23. | |
| Title | Untrusted user data can lead to privilege escalation | |
| Weaknesses | CWE-269 CWE-287 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2026-01-30T14:44:30.165Z
Reserved: 2025-06-26T14:24:52.468Z
Link: CVE-2025-6723
Updated: 2026-01-30T14:44:20.194Z
Status : Received
Published: 2026-01-30T14:16:06.510
Modified: 2026-01-30T14:16:06.510
Link: CVE-2025-6723
No data.
OpenCVE Enrichment
No data.