Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rxxw-q6vh-r7c8

Опубликовано: 11 фев. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.4
CVSS3: 6.7

Описание

A vulnerability has been identified in ModelSim (All versions < V2025.1), Questa (All versions < V2025.1). An example setup script contained in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch the script from a user-writable directory.

A vulnerability has been identified in ModelSim (All versions < V2025.1), Questa (All versions < V2025.1). An example setup script contained in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch the script from a user-writable directory.

EPSS

Процентиль: 5%
0.00022
Низкий

5.4 Medium

CVSS4

6.7 Medium

CVSS3

Дефекты

CWE-427

Связанные уязвимости

CVSS3: 6.7
nvd
12 месяцев назад

A vulnerability has been identified in ModelSim (All versions < V2025.1), Questa (All versions < V2025.1). An example setup script contained in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch the script from a user-writable directory.

EPSS

Процентиль: 5%
0.00022
Низкий

5.4 Medium

CVSS4

6.7 Medium

CVSS3

Дефекты

CWE-427