Arc Temporary File Vulnerability Allows Root Privilege Execution
CVE-2023-5936

7.8HIGH

Key Information:

Vendor
Nozomi Networks
Status
Arc
Vendor
CVE Published:
15 May 2024

Summary

On Unix-based systems such as Linux and MacOS, a vulnerability exists in the Arc application due to its use of a temporary file with unsafe privileges. This flaw enables a malicious local user to manipulate the temporary file, potentially leading to unauthorized execution of arbitrary code with elevated root privileges. System administrators and users of Arc are urged to take precautions by applying necessary updates and monitoring any suspicious activities.

Affected Version(s)

Arc Linux 0 < 1.6.0

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This issue was found by Diego Giubertoni of Nozomi Networks Security Research team during an internal penetration testing session.
.