First published: Tue Feb 27 2024(Updated: )
A flaw in Thales SafeNet Authentication Client prior to 10.8 R10 on Windows allows an attacker to execute code at a SYSTEM level via local access.
Credit: psirt@thalesgroup.com
Affected Software | Affected Version | How to fix |
---|---|---|
Thales SafeNet Authentication Client | <10.8 R10 | |
All of | ||
Any of | ||
Thales SafeNet Authentication Client | <10.8 | |
Thales SafeNet Authentication Client | =10.8 | |
Thales SafeNet Authentication Client | =10.8-r1 | |
Thales SafeNet Authentication Client | =10.8-r5 | |
Thales SafeNet Authentication Client | =10.8-r6 | |
Thales SafeNet Authentication Client | =10.8-r8 | |
Thales SafeNet Authentication Client | =10.8-r9 | |
Microsoft Windows Operating System |
Upgrade to the current SafeNet Authentication Client 10.8 R10 (GA).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-7016 is considered high due to its potential to allow code execution at the SYSTEM level.
To fix CVE-2023-7016, upgrade to Thales SafeNet Authentication Client version 10.8 R10 or later.
The potential impacts of CVE-2023-7016 include unauthorized access and control over affected systems due to local code execution.
Users of Thales SafeNet Authentication Client versions prior to 10.8 R10 on Windows are affected by CVE-2023-7016.
As of now, there are no confirmed reports of active exploitation of CVE-2023-7016 in the wild.