Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-48654: n/a

0
Unknown
VulnerabilityCVE-2023-48654cvecve-2023-48654
Published: Mon Dec 25 2023 (12/25/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

One Identity Password Manager before 5.13.1 allows Kiosk Escape. This product enables users to reset their Active Directory passwords on the login screen of a Windows client. It launches a Chromium based browser in Kiosk mode to provide the reset functionality. The escape sequence is: go to the Google ReCAPTCHA section, click on the Privacy link, observe that there is a new browser window, navigate to any website that offers file upload, navigate to cmd.exe from the file explorer window, and launch cmd.exe as NT AUTHORITY\SYSTEM.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:52:56 UTC

Technical Analysis

CVE-2023-48654 is a privilege escalation and kiosk escape vulnerability affecting One Identity Password Manager versions prior to 5.13.1. This product facilitates Active Directory password resets directly from the Windows login screen by launching a Chromium-based browser in Kiosk mode, which is intended to restrict user actions to the password reset interface. However, the vulnerability allows an attacker to bypass these restrictions by exploiting the embedded Google ReCAPTCHA privacy link. The attacker clicks the privacy link, which opens a new browser window outside the kiosk constraints. From there, the attacker navigates to a website that supports file uploads, which triggers the Windows file explorer interface. Using this interface, the attacker can locate and execute cmd.exe, launching a command prompt with NT AUTHORITY\SYSTEM privileges. This effectively grants full administrative control over the affected Windows client without requiring authentication or user interaction beyond the initial access to the login screen. The lack of a CVSS score indicates this is a newly published vulnerability with no public exploit code yet. The attack chain leverages the interaction between the embedded Chromium browser, external web content, and Windows file system access to break out of the kiosk sandbox. This vulnerability could be exploited by anyone with physical or remote access to the login screen, potentially allowing lateral movement and full domain compromise in enterprise environments.

Potential Impact

The impact of CVE-2023-48654 on European organizations is significant due to the potential for full system compromise on endpoints used for Active Directory password resets. Attackers exploiting this vulnerability can gain SYSTEM-level access on Windows clients, bypassing authentication controls and potentially moving laterally within corporate networks. This threatens the confidentiality, integrity, and availability of critical systems and sensitive data. Organizations relying on One Identity Password Manager for secure password reset workflows may see their endpoint security undermined, increasing the risk of ransomware, data breaches, and persistent threats. The vulnerability is particularly dangerous in environments with high-value targets such as financial institutions, government agencies, and critical infrastructure operators prevalent in Europe. The ease of exploitation—requiring only access to the login screen—means that compromised or malicious insiders, or attackers with physical or remote access to endpoints, could leverage this flaw to escalate privileges and compromise entire Active Directory domains. This could disrupt business operations, cause regulatory compliance failures under GDPR, and damage organizational reputation.

Mitigation Recommendations

To mitigate CVE-2023-48654, European organizations should immediately upgrade One Identity Password Manager to version 5.13.1 or later once available. Until patches are applied, restrict physical and remote access to Windows login screens where the vulnerable password manager is deployed. Implement strict network segmentation to limit exposure of endpoints running the vulnerable software. Disable or restrict access to external web content within the password reset kiosk browser, especially links that open new windows or allow file uploads. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block unauthorized execution of cmd.exe or other system utilities. Review and harden Active Directory password reset policies to minimize reliance on kiosk mode password resets. Conduct user training to recognize suspicious activity at login screens. Finally, monitor logs for unusual kiosk browser behavior or unexpected command prompt launches. Coordinated incident response plans should be prepared in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-11-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a5558a730e5a3d9d7c208

Added to database: 11/4/2025, 7:34:48 PM

Last enriched: 11/4/2025, 7:52:56 PM

Last updated: 11/5/2025, 1:47:30 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats