First published: Tue Feb 27 2024(Updated: )
A flaw in the Windows Installer in Thales SafeNet Authentication Client prior to 10.8 R10 on Windows allows an attacker to escalate their privilege level via local access.
Credit: psirt@thalesgroup.com
Affected Software | Affected Version | How to fix |
---|---|---|
Thales SafeNet Authentication Client | <10.8 R10 | |
All of | ||
Any of | ||
Thales SafeNet Authentication Client | <10.8 | |
Thales SafeNet Authentication Client | =10.8 | |
Thales SafeNet Authentication Client | =10.8-r1 | |
Thales SafeNet Authentication Client | =10.8-r5 | |
Thales SafeNet Authentication Client | =10.8-r6 | |
Thales SafeNet Authentication Client | =10.8-r8 | |
Thales SafeNet Authentication Client | =10.8-r9 | |
Microsoft Windows Operating System |
Upgrade to the current SafeNet Authentication Client 10.8 R10 (GA).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5993 has been classified as a high severity privilege escalation vulnerability.
To remediate CVE-2023-5993, upgrade Thales SafeNet Authentication Client to version 10.8 R10 or later.
CVE-2023-5993 affects versions of Thales SafeNet Authentication Client prior to 10.8 R10 on Windows.
CVE-2023-5993 is a privilege escalation vulnerability that allows local attackers to elevate their access rights.
No, CVE-2023-5993 requires local access to exploit the vulnerability.