First published: Mon Nov 06 2023(Updated: )
Netskope was made aware of a security vulnerability in its NSClient product for version 100 & prior where a malicious non-admin user can disable the Netskope client by using a specially-crafted package. The root cause of the problem was a user control code when called by a Windows ServiceController did not validate the permissions associated with the user before executing the user control code. This user control code had permissions to terminate the NSClient service.
Credit: psirt@netskope.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Netskope | <101 | |
Microsoft Windows Operating System |
Netskope patched the issue and released a new version. The issue was fixed in Release101. Customers are recommended to upgrade their client to the versions R101 or greater. Netskope download Instructions – Download Netskope Client and Scripts – Netskope Support https://support.netskope.com/s/article/Download-Netskope-Client-and-Scripts
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4996 is a vulnerability that allows a malicious non-admin user to disable the Netskope client by using a specially-crafted package.
CVE-2023-4996 affects Netskope NSClient version 100 and prior, allowing a malicious non-admin user to disable the client.
The root cause of CVE-2023-4996 is a user control code issue when called by a Windows ServiceController.
No, Microsoft Windows is not vulnerable to CVE-2023-4996.
CVE-2023-4996 has a severity rating of 8.8 (high).
To fix CVE-2023-4996, update Netskope NSClient to version 101 or later.