NNM failed to properly set ACLs on its installation directory, which could allow a low privileged user to run arbitrary code with SYSTEM privileges where NNM is installed to a non-standard location
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://www.tenable.com/security/tns-2023-34 | patch vendor advisory |