ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission), ZED! for Windows before Q.2021.2 (ANSSI qualification submission), ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission), ZONECENTRAL for Windows before 2023.5, or ZEDMAIL for Windows before 2023.5 disclose the original path in which the containers were created, which allows an unauthenticated attacker to obtain some information regarding the context of use (project name, etc.).
References
Link | Resource |
---|---|
https://www.primx.eu/en/bulletins/security-bulletin-23B30930/ | Vendor Advisory |
https://www.primx.eu/fr/blog/ | Product |
https://www.primx.eu/en/bulletins/security-bulletin-23B30930/ | Vendor Advisory |
https://www.primx.eu/fr/blog/ | Product |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-12-13 21:15
Updated : 2024-11-21 08:36
NVD link : CVE-2023-50439
Mitre link : CVE-2023-50439
CVE.ORG link : CVE-2023-50439
JSON object : View
Products Affected
primx
- zed\!
- zonecentral
- zedmail
CWE