CVE-2023-28140

Executable Hijacking

Description

An Executable Hijacking condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.5.3.1. Attackers may load a malicious copy of a Dependency Link Library (DLL) via a local attack vector instead of the DLL that the application was expecting, when processes are running with escalated privileges. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.

Remediation

Solution:

  • Upgrade to v4.5.3.1 of Qualys Cloud Agent for Windows.

Category

6.7
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.15%
Vendor Advisory qualys.com
Affected: Qualys Cloud Agent
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-28140?
CVE-2023-28140 has been scored as a medium severity vulnerability.
How to fix CVE-2023-28140?
To fix CVE-2023-28140: Upgrade to v4.5.3.1 of Qualys Cloud Agent for Windows.
Is CVE-2023-28140 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-28140 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-28140?
CVE-2023-28140 affects Qualys Cloud Agent.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.