First published: Tue Nov 08 2022(Updated: )
Buffer overflow vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code.
Credit: psirt-info@cyber.jp.nec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nec Expresscluster X | <=5.0 | |
Nec Expresscluster X Singleserversafe | <=5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34823 is a buffer overflow vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier which allows a remote unauthenticated attacker to overwrite existing files.
CVE-2022-34823 has a severity rating of 9.8 (Critical).
CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, and EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier versions are affected.
No, CVE-2022-34823 can be exploited by a remote unauthenticated attacker.
You can find more information about CVE-2022-34823 at the following link: [https://jpn.nec.com/security-info/secinfo/nv22-014_en.html]