Impact
The vulnerability stems from incorrect permission assignment to a critical resource in Owl Cyberdefense's Opds 2.2.0.4, enabling an attacker to manipulate files through a crafted network request. This flaw can lead to unauthorized modification or deletion of critical files, potentially compromising system integrity and availability. The weakness aligns with CWE-732, which concerns improper authorization.
Affected Systems
Affected vendors include Owl Cyberdefense, specifically the Opds platform. The CVE lists Version 2.2.0.4 as vulnerable, with additional older builds such as Opds-1000 and Opds-100 possibly impacted. The precise scope of vulnerable deployments is not fully delineated beyond the CPE entries, but any device running the listed versions is at risk.
Risk and Exploitability
The CVSS score of 8.5 indicates high severity. However, the EPSS of less than 1% suggests that exploitation is unlikely at present, and the vulnerability is not currently in the CISA KEV catalog. Attackers would need network access to the targeted endpoint and could exploit the unauthorized file manipulation through a specially crafted request. The impact includes loss of integrity and potential denial of service if critical configuration files are altered.
OpenCVE Enrichment