Local privilege escalation using log file
CVE-2022-4149

7HIGH

Key Information:

Vendor

Netskope

Vendor
CVE Published:
15 June 2023

Badges

๐Ÿ‘พ Exploit Exists

What is CVE-2022-4149?

The Netskope Client Service prior to version R96 on Windows operates with NT AUTHORITY\SYSTEM privileges and logs data to a publicly writable directory (C:\Users\Public\netSkope). This directory setup leads to a race condition where a malicious local user can exploit the logplaceholder file, which allows broad access rights. By creating this file with modified ACL permissions, attackers can manipulate other files within the directory. The use of Windows pseudo-symlinks permits these malicious users to elevate their privileges and potentially gain unauthorized access to sensitive system areas.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Netskope Client Windows 95, 0

References

CVSS V3.1

Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Netskope credits Dawson Medin from Mandiant for reporting this flaw.
.