CVE-2023-1164
Published Mar 3, 2023
Last updated 6 months ago
Overview
- Description
- A vulnerability was found in KylinSoft kylin-activation on KylinOS and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260.
- Source
- cna@vuldb.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Secondary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:kylinos:kylin_os:*:*:*:*:desktop:*:*:*", "vulnerable": true, "matchCriteriaId": "C252764F-C50D-48FB-A5B1-249C0BABF15D", "versionEndExcluding": "1.3.11-23" }, { "criteria": "cpe:2.3:o:kylinos:kylin_os:*:*:*:*:server:*:*:*", "vulnerable": true, "matchCriteriaId": "A6A58525-6877-43FA-BB56-7613B8FD560E", "versionEndExcluding": "1.30.10-5.p23" } ], "operator": "OR" } ] } ]