An issue was discovered in Faronics Insight 10.0.19045 on Windows. An unauthenticated attacker is able to upload any type of file to any location on the Teacher Console's computer, enabling a variety of different exploitation paths including code execution. It is also possible for the attacker to chain this vulnerability with others to cause a deployed DLL file to immediately execute as NT AUTHORITY/SYSTEM.
References
Link | Resource |
---|---|
https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ | Exploit Third Party Advisory |
https://research.nccgroup.com/?research=Technical%20advisories | Third Party Advisory |
https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ | Exploit Third Party Advisory |
https://research.nccgroup.com/?research=Technical%20advisories | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/ - Exploit, Third Party Advisory | |
References | () https://research.nccgroup.com/?research=Technical%20advisories - Third Party Advisory |
Information
Published : 2023-05-31 00:15
Updated : 2025-01-13 21:15
NVD link : CVE-2023-28353
Mitre link : CVE-2023-28353
CVE.ORG link : CVE-2023-28353
JSON object : View
Products Affected
faronics
- insight
microsoft
- windows
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type