Skip to main content

CVE-2023-45160: CWE-552 Files or Directories Accessible to External Parties in 1E 1E Client

High
VulnerabilityCVE-2023-45160cvecve-2023-45160cwe-552
Published: Thu Oct 05 2023 (10/05/2023, 15:12:20 UTC)
Source: CVE
Vendor/Project: 1E
Product: 1E Client

Description

In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch. Resolution: This has been fixed in patch Q23094  This issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site. Customers with Mac Client versions higher than v8.1 will need to upgrade to v23.11 to remediate this vulnerability.

AI-Powered Analysis

AILast updated: 07/04/2025, 12:56:08 UTC

Technical Analysis

CVE-2023-45160 is a high-severity vulnerability (CVSS 8.8) affecting the 1E Client software, specifically related to improper access control of temporary resource files. The vulnerability is categorized under CWE-552, which involves files or directories accessible to external parties. In this case, an ordinary user with limited privileges can manipulate the 1E Client's downloaded instruction resource files by substituting legitimate script files with malicious scripts. This occurs because the temporary directory used by the 1E Client to store these resource files was not properly locked down, allowing unauthorized modification at runtime. Exploiting this flaw could lead to execution of arbitrary malicious code with the privileges of the 1E Client process, potentially compromising confidentiality, integrity, and availability of affected systems. The issue affects both Windows and Mac versions of the 1E Client, with the Mac Client vulnerability fixed in version 8.1.2.62 and later, and the Windows Client patched in update Q23094. The vulnerability does not require user interaction but does require low-level privileges (PR:L) to exploit. No known exploits are currently reported in the wild. The vulnerability allows network-based exploitation (AV:N), making it more accessible to attackers who can reach the affected systems remotely. The patch locks down the temporary directory to prevent unauthorized file substitution, effectively mitigating the risk.

Potential Impact

For European organizations using the 1E Client, this vulnerability poses a significant risk. The ability for an ordinary user to inject malicious scripts can lead to unauthorized code execution, data breaches, and disruption of critical IT management functions that 1E Client typically supports, such as software deployment and endpoint management. Given the high CVSS score and the potential for full compromise of affected endpoints, attackers could leverage this vulnerability to move laterally within networks, escalate privileges, or disrupt business operations. This is particularly concerning for sectors with strict data protection requirements under GDPR, such as finance, healthcare, and government agencies, where confidentiality and integrity of data are paramount. The network attack vector means that attackers could exploit this vulnerability remotely if they have access to the network, increasing the threat surface. The absence of required user interaction further raises the risk of automated exploitation in targeted attacks or malware campaigns. Organizations relying on 1E Client for endpoint management should consider this vulnerability a priority for remediation to avoid operational and compliance risks.

Mitigation Recommendations

1. Immediate application of the vendor-provided patches is critical: upgrade Windows 1E Client installations to patch Q23094 and Mac Clients to version 8.1.2.62 or later (preferably v23.11). 2. Restrict access permissions on the 1E Client temporary directories to prevent unauthorized users from modifying files, even before patching. 3. Implement strict endpoint privilege management to limit the ability of ordinary users to write or replace files in application directories. 4. Monitor file integrity of the 1E Client resource directories using host-based intrusion detection systems (HIDS) to detect unauthorized changes. 5. Employ network segmentation and access controls to limit exposure of systems running 1E Client to untrusted networks or users. 6. Conduct regular audits of installed software versions across the enterprise to ensure all 1E Clients are updated promptly. 7. Educate IT and security teams about this vulnerability to recognize potential exploitation signs and respond swiftly. These steps go beyond generic patching advice by emphasizing proactive access control, monitoring, and network defense tailored to the 1E Client environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
1E
Date Reserved
2023-10-04T23:59:54.078Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb18a

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 12:56:08 PM

Last updated: 8/7/2025, 4:53:58 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats