First published: Tue Nov 08 2022(Updated: )
Weak File and Folder Permissions vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code.
Credit: psirt-info@cyber.jp.nec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nec Expresscluster X | <=5.0 | |
Nec Expresscluster X Singleserversafe | <=5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34824 is a Weak File and Folder Permissions vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, and EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier, which allows a remote unauthenticated attacker to exploit weak file and folder permissions.
CVE-2022-34824 vulnerability has a severity level of critical with a CVSS score of 9.8.
CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, and EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier are affected by CVE-2022-34824 vulnerability.
An attacker can exploit CVE-2022-34824 vulnerability by taking advantage of weak file and folder permissions in the affected software, allowing them to execute unauthorized actions remotely.
Yes, NEC has provided a fix to address the CVE-2022-34824 vulnerability. It is recommended to apply the latest security patch or upgrade to a patched version of the affected software.