Home

Description

On Unix systems (Linux, MacOS), Arc uses a temporary file with unsafe privileges. By tampering with such file, a malicious local user in the system may be able to trigger arbitrary code execution with root privileges.

PUBLISHED Reserved 2023-11-02 | Published 2024-05-15 | Updated 2024-08-02 | Assigner Nozomi




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

HIGH: 7.3CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-732 Incorrect Permission Assignment for Critical Resource

Product status

Default status
unaffected

Any version before 1.6.0
affected

Credits

This issue was found by Diego Giubertoni of Nozomi Networks Security Research team during an internal penetration testing session. finder

References

security.nozominetworks.com/NN-2023:14-01

security.nozominetworks.com/NN-2023:14-01

cve.org (CVE-2023-5936)

nvd.nist.gov (CVE-2023-5936)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.