ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission); ZED! for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before 2023.5; ZEDMAIL for Windows before 2023.5; ZED! for Windows, Mac, Linux before 2023.5; ZEDFREE for Windows, Mac, Linux before 2023.5; or ZEDPRO for Windows, Mac, Linux before 2023.5 can be modified by an unauthenticated attacker to include a UNC reference so that it could trigger network access to an attacker-controlled computer when opened by the victim.
References
Link | Resource |
---|---|
https://www.primx.eu/en/bulletins/security-bulletin-23B30931/ | Vendor Advisory |
https://www.primx.eu/fr/blog/ | Product |
https://www.primx.eu/en/bulletins/security-bulletin-23B30931/ | Vendor Advisory |
https://www.primx.eu/fr/blog/ | Product |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-12-13 21:15
Updated : 2024-11-21 08:36
NVD link : CVE-2023-50440
Mitre link : CVE-2023-50440
CVE.ORG link : CVE-2023-50440
JSON object : View
Products Affected
primx
- zed\!
- zonecentral
- zedmail
CWE