Skip to main content

CVE-2023-45159: CWE-59 Improper Link Resolution Before File Access ('Link Following') in 1E 1E Client

High
VulnerabilityCVE-2023-45159cvecve-2023-45159cwe-59
Published: Thu Oct 05 2023 (10/05/2023, 10:11:20 UTC)
Source: CVE
Vendor/Project: 1E
Product: 1E Client

Description

1E Client installer can perform arbitrary file deletion on protected files.   A non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. A hotfix is available from the 1E support portal that forces the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID. for v8.1 use hotfix Q23097 for v8.4 use hotfix Q23105 for v9.0 use hotfix Q23115 for SaaS customers, use 1EClient v23.7 plus hotfix Q23121

AI-Powered Analysis

AILast updated: 07/04/2025, 12:55:55 UTC

Technical Analysis

CVE-2023-45159 is a high-severity vulnerability classified under CWE-59 (Improper Link Resolution Before File Access, also known as 'Link Following') affecting the 1E Client software. The vulnerability arises because the 1E Client installer, when running on Windows, can be tricked by a non-privileged user into deleting arbitrary protected files or directories. This is achieved by the attacker creating a symbolic link (symlink) or Windows junction that points to a protected directory. When the 1E Client service starts, it follows this link and clears the target directory, resulting in unauthorized deletion of files that should be protected. The vulnerability does not require elevated privileges or user interaction, making it easier to exploit in environments where unprivileged users have access to the system. The vendor has released hotfixes for versions 8.1, 8.4, and 9.0, as well as for SaaS customers, which mitigate the issue by forcing the 1E Client to detect symbolic links or junctions and refuse to use those paths. Instead, it creates a new path involving a random GUID to prevent link following attacks. The CVSS v3.1 base score is 8.4, reflecting high impact on confidentiality, integrity, and availability due to the potential for arbitrary file deletion. No known exploits are reported in the wild yet, but the vulnerability's nature and ease of exploitation make it a significant risk if left unpatched.

Potential Impact

For European organizations using the 1E Client, this vulnerability poses a serious risk to system stability and data integrity. The arbitrary deletion of protected files could lead to service disruptions, loss of critical configuration or operational data, and potential downtime. This is especially impactful in enterprise environments where 1E Client is used for endpoint management, software deployment, or patch management, as the deletion of files could interrupt these essential functions. Confidentiality is also at risk if sensitive files are deleted or replaced. The vulnerability could be exploited by insider threats or malware running with limited privileges, amplifying the risk in environments with multiple users or shared systems. Given the high CVSS score and the lack of required privileges or user interaction, the threat could propagate quickly if attackers gain initial access. European organizations with strict data protection regulations (e.g., GDPR) may face compliance issues if data loss or service interruptions occur due to this vulnerability.

Mitigation Recommendations

European organizations should immediately apply the vendor-provided hotfixes corresponding to their 1E Client version (Q23097 for v8.1, Q23105 for v8.4, Q23115 for v9.0, and Q23121 for SaaS customers with 1EClient v23.7). Beyond patching, organizations should audit and restrict the ability of non-privileged users to create symbolic links or junctions on systems running the 1E Client, using Windows Group Policy or local security policies. Implementing strict file system permissions to limit who can create or modify links in directories monitored or used by the 1E Client is critical. Monitoring and alerting for unusual symbolic link creation or unexpected file deletions in protected directories can provide early detection of exploitation attempts. Additionally, organizations should review and harden endpoint security controls to prevent unauthorized local access and consider application whitelisting to restrict execution of unauthorized installers or scripts that could exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
1E
Date Reserved
2023-10-04T23:59:54.078Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb188

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 12:55:55 PM

Last updated: 8/12/2025, 2:49:54 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats