First published: Mon Sep 18 2023(Updated: )
Certain WithSecure products allow a remote crash of a scanning engine via processing of an import struct in a PE file. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WithSecure Client Security | =15 | |
WithSecure Elements Endpoint Protection | >=17 | |
WithSecure Email and Server Security | =15 | |
WithSecure Server Security | =15 | |
Microsoft Windows | ||
Apple macOS | ||
WithSecure Linux Protection | =12.0 | |
WithSecure Linux Security 64 | =12.0 | |
Linux Linux kernel | ||
WithSecure Atlant | =1.0.35-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-42522.
This vulnerability affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later.
The severity of CVE-2023-42522 is high with a severity value of 7.5.
There is currently no known fix for CVE-2023-42522. It is recommended to apply any patches or updates provided by WithSecure.
You can find more information about this vulnerability on the WithSecure website [here](https://www.withsecure.com/en/support/security-advisories).