Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46047: n/a

0
High
VulnerabilityCVE-2023-46047cvecve-2023-46047
Published: Wed Mar 27 2024 (03/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Sane 1.2.1 allows a local attacker to execute arbitrary code via a crafted file to the sanei_configure_attach() function. NOTE: this is disputed because there is no expectation that the product should be starting with an attacker-controlled configuration file.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:58:54 UTC

Technical Analysis

CVE-2023-46047 is a vulnerability identified in Sane version 1.2.1, a widely used open-source scanning software suite. The flaw exists in the sanei_configure_attach() function, which processes configuration files. A local attacker with limited privileges can exploit this vulnerability by providing a specially crafted configuration file, leading to arbitrary code execution. The vulnerability is categorized under CWE-20 (Improper Input Validation), indicating that the software does not adequately validate or sanitize input data before processing. The attack requires local access (CVSS vector AV:L) and low complexity (AC:L), with privileges at the level of a normal user (PR:L) and some user interaction (UI:R). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflecting the potential for full system compromise. The note in the description highlights some dispute about the vulnerability's practical exploitability since the software is not expected to start with attacker-controlled configuration files, which may limit the attack surface. No patches or known exploits are currently available, emphasizing the need for vigilance and proactive mitigation. The vulnerability's presence in a core scanning component means that systems relying on Sane for document scanning or imaging could be at risk if local users are untrusted or compromised.

Potential Impact

For European organizations, the impact of CVE-2023-46047 can be significant in environments where Sane scanning software is deployed, particularly in workplaces with shared or multi-user systems. Successful exploitation could allow a local attacker to execute arbitrary code with the privileges of the user running the scanning software, potentially leading to privilege escalation, data theft, or disruption of scanning services. This could compromise sensitive documents or internal workflows dependent on scanning infrastructure. The vulnerability's requirement for local access and user interaction reduces the risk from remote attackers but raises concerns about insider threats or attackers who have gained limited local access through other means. Organizations in sectors such as government, healthcare, and finance, which often use scanning devices and software for document management, may face operational disruptions or data breaches. Additionally, the lack of an available patch increases the window of exposure, necessitating interim security controls. The high confidentiality, integrity, and availability impact ratings underscore the criticality of addressing this vulnerability promptly to avoid potential lateral movement or system compromise within networks.

Mitigation Recommendations

To mitigate CVE-2023-46047 effectively, European organizations should implement several specific measures beyond generic advice: 1) Restrict local file system permissions to prevent unauthorized users from writing or modifying configuration files used by Sane, ensuring only trusted administrators have such access. 2) Employ file integrity monitoring solutions to detect unauthorized changes to configuration files related to the scanning software. 3) Limit the number of users with local access to systems running Sane, enforcing strict access controls and user account management policies. 4) Use application whitelisting or sandboxing techniques to restrict the execution of unauthorized code that could be triggered by malicious configuration files. 5) Monitor logs and system behavior for anomalies related to scanning software execution or configuration changes. 6) Stay informed about vendor or community updates regarding patches or security advisories for Sane and apply them promptly once available. 7) Educate users about the risks of local file manipulation and enforce policies to prevent the introduction of untrusted files into scanning environments. These targeted actions will reduce the attack surface and limit the potential for exploitation until an official patch is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-10-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47356d939959c8021afe

Added to database: 11/4/2025, 6:34:29 PM

Last enriched: 11/4/2025, 6:58:54 PM

Last updated: 12/18/2025, 7:30:16 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats