First published: Thu Jun 15 2023(Updated: )
The Netskope client service running with NT\SYSTEM privileges accepts network connections from localhost to start various services and execute commands. The connection handling function of Netskope client before R100 in this service utilized a relative path to download and unzip configuration files on the machine. This relative path provided a way for local users to write arbitrary files at a location which is accessible to only higher privileged users. This can be exploited by local users to execute code with NT\SYSTEM privileges on the end machine.
Credit: psirt@netskope.com psirt@netskope.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Microsoft Windows Operating System | ||
Netskope | <100 | |
Netskope | <100 | |
Microsoft Windows Operating System |
Upgrade netskope client to R100 and above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-2270 is high with a CVSS score of 7.8.
The affected software for CVE-2023-2270 is Netskope client version up to R100.
CVE-2023-2270 is a vulnerability in the Netskope client service that allows network connections from localhost to start services and execute commands.
To fix CVE-2023-2270, it is recommended to update to a version of Netskope client R100 or higher.
No, Microsoft Windows systems are not vulnerable to CVE-2023-2270.