Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Permission Issues
Category ID:275
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
2051Vulnerabilities found

CVE-2026-32680
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.5||HIGH
EPSS-0.02% / 4.11%
||
7 Day CHG~0.00%
Published-26 Mar, 2026 | 06:55
Updated-19 May, 2026 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The installer of RATOC RAID Monitoring Manager for Windows allows to customize the installation folder. If the installation folder is customized to some non-default one, the folder may be left with un-secure ACLs and non-administrative users can alter contents of that folder. It may allow a non-administrative user to execute an arbitrary code with SYSTEM privilege.

Action-Not Available
Vendor-RATOC Systems, Inc.
Product-RATOC RAID Monitoring Manager for Windows
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-24063
Assigner-SEC Consult Vulnerability Lab
ShareView Details
Assigner-SEC Consult Vulnerability Lab
CVSS Score-8.2||HIGH
EPSS-0.01% / 1.53%
||
7 Day CHG~0.00%
Published-18 Mar, 2026 | 15:33
Updated-19 May, 2026 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
World-writable uninstall script executed as root in Arturia Software Center

When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninstalling a plugin via the Arturia Software Center the Privileged Helper gets instructed to execute this script. When the bash script is manipulated by an attacker this scenario will lead to privilege escalation.

Action-Not Available
Vendor-Arturia
Product-Software Center
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2016-20029
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-6.9||MEDIUM
EPSS-0.01% / 1.44%
||
7 Day CHG~0.00%
Published-15 Mar, 2026 | 13:35
Updated-16 Mar, 2026 | 14:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZKTeco ZKBioSecurity 3.0 File Path Manipulation Vulnerability

ZKTeco ZKBioSecurity 3.0 contains a file path manipulation vulnerability that allows attackers to access arbitrary files by modifying file paths used to retrieve local resources. Attackers can manipulate path parameters to bypass access controls and retrieve sensitive information including configuration files, source code, and protected application resources.

Action-Not Available
Vendor-ZKTeco Inc.
Product-ZKTeco ZKBioSecurity
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-57849
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 0.53%
||
7 Day CHG~0.00%
Published-13 Mar, 2026 | 03:08
Updated-16 Mar, 2026 | 14:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Fuse: privilege escalation via excessive /etc/passwd permissions

A container privilege escalation flaw was found in certain Fuse images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Fuse 7
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-8766
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 0.53%
||
7 Day CHG~0.00%
Published-13 Mar, 2026 | 02:48
Updated-10 May, 2026 | 07:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Noobaa-core: excessive permissions of /etc could lead to escalation of privilege in the noobaa-core container

A container privilege escalation flaw was found in certain Multi-Cloud Object Gateway Core images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Openshift Data Foundation 4
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-26131
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.06%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 17:05
Updated-14 Apr, 2026 | 16:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
.NET Elevation of Privilege Vulnerability

Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Linux Kernel Organization, IncMicrosoft Corporation
Product-linux_kernel.net.NET 10.0
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-3315
Assigner-National Cyber Security Centre Finland (NCSC-FI)
ShareView Details
Assigner-National Cyber Security Centre Finland (NCSC-FI)
CVSS Score-5.8||MEDIUM
EPSS-0.02% / 3.60%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 09:35
Updated-07 May, 2026 | 20:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege Escalation Due to Writable Executable in Privileged Visionline Service Path

Incorrect Default Permissions, : Execution with Unnecessary Privileges, : Incorrect Permission Assignment for Critical Resource vulnerability in ASSA ABLOY Visionline on Windows allows Configuration/Environment Manipulation.This issue affects Visionline: from 1.0 before 1.33.

Action-Not Available
Vendor-assaabloyASSA ABLOYMicrosoft Corporation
Product-windowsvisionlineVisionline
CWE ID-CWE-250
Execution with Unnecessary Privileges
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2026-28267
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 4.85%
||
7 Day CHG~0.00%
Published-09 Mar, 2026 | 22:28
Updated-19 May, 2026 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple i-フィルター products are configured with improper file access permission settings. Files may be created or overwritten in the system directory or backup directory by a non-administrative user.

Action-Not Available
Vendor-OPTiM CorporationDigital Arts Inc.Inventit Inc.Fujitsu Limited
Product-i-FILTER ブラウザー&クラウド MultiAgent for WindowsMobiConnect i-FILTER Browser Option MultiAgent for Windowsi-フィルター for ネットカフェi-フィルター for ZAQ (Windows version only)i-フィルター 6.0i-フィルター for プロバイダーi-フィルター 10 (Windows version only)i-FILTER Browser & Cloud MultiAgent for Windowsi-フィルター for マルチデバイス (Windows version only)DigitalArts@Cloud Agent (for Windows)Optimal Biz Web Filtering Powered by i-FILTER (Windows version)
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-21736
Assigner-Imagination Technologies
ShareView Details
Assigner-Imagination Technologies
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 0.29%
||
7 Day CHG~0.00%
Published-09 Mar, 2026 | 12:23
Updated-10 Mar, 2026 | 18:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GPU DDK - Insufficient permission check in PhysmemWrapExtMem() when write attribute support enabled

Software installed and run as a non-privileged user may conduct improper GPU system calls to gain write permission to read-only wrapped user-mode memory. This is caused by improper handling of the memory protections for the user-mode wrapped memory resource.

Action-Not Available
Vendor-Imagination Technologies Limited
Product-ddkGraphics DDK
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2026-28717
Assigner-Acronis International GmbH
ShareView Details
Assigner-Acronis International GmbH
CVSS Score-5||MEDIUM
EPSS-0.01% / 0.22%
||
7 Day CHG~0.00%
Published-05 Mar, 2026 | 23:53
Updated-11 Mar, 2026 | 14:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Local privilege escalation due to improper directory permissions. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.

Action-Not Available
Vendor-Acronis (Acronis International GmbH)Microsoft Corporation
Product-windowscyber_protectAcronis Cyber Protect 17
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-28727
Assigner-Acronis International GmbH
ShareView Details
Assigner-Acronis International GmbH
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.66%
||
7 Day CHG~0.00%
Published-05 Mar, 2026 | 23:45
Updated-02 Apr, 2026 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Local privilege escalation due to insecure Unix socket permissions. The following products are affected: Acronis Cyber Protect 17 (macOS) before build 41186, Acronis Cyber Protect Cloud Agent (macOS) before build 41124, Acronis True Image (macOS) before build 42902.

Action-Not Available
Vendor-Acronis (Acronis International GmbH)Apple Inc.
Product-agentcyber_protectmacosAcronis True ImageAcronis Cyber Protect Cloud AgentAcronis Cyber Protect 17
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-26034
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.5||HIGH
EPSS-0.01% / 0.77%
||
7 Day CHG~0.00%
Published-05 Mar, 2026 | 02:24
Updated-09 Mar, 2026 | 18:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UPS Multi-UPS Management Console (MUMC) version 01.06.0001 (A03) contains an Incorrect Default Permissions (CWE-276) vulnerability that allows an attacker to execute arbitrary code with SYSTEM privileges by causing the application to load a specially crafted DLL.

Action-Not Available
Vendor-Dell Inc.Dell Inc.
Product-ups_multi-ups_management_consoleUPS Multi-UPS Management Console (MUMC)
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2026-20062
Assigner-Cisco Systems, Inc.
ShareView Details
Assigner-Cisco Systems, Inc.
CVSS Score-7.2||HIGH
EPSS-0.01% / 0.29%
||
7 Day CHG~0.00%
Published-04 Mar, 2026 | 17:22
Updated-05 Mar, 2026 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the CLI of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software in multiple context mode could allow an authenticated, local attacker with administrative privileges in one context to copy files to or from another context, including configuration files. This vulnerability is due to improper access controls for Secure Copy Protocol (SCP) operations when the CiscoSSH stack is enabled. An attacker could exploit this vulnerability by authenticating to a non-admin context of the device and issuing crafted SCP copy commands in that non-admin context. A successful exploit could allow the attacker to read, create, or overwrite sensitive files that belong to another context, including the admin and system contexts. The attacker cannot directly impact the availability of services pertaining to other contexts. To exploit this vulnerability, the attacker must have valid administrative credentials for a non-admin context. Note: An attacker cannot list or enumerate files from another context and would need to know the exact file path, which increases the complexity of a successful attack.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
CWE ID-CWE-279
Incorrect Execution-Assigned Permissions
CVE-2025-12801
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 4.11%
||
7 Day CHG~0.00%
Published-04 Mar, 2026 | 15:25
Updated-02 Apr, 2026 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nfs-utils: rpc.mountd in the nfs-utils privilege escalation

A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.

Action-Not Available
Vendor-linux-nfsRed Hat, Inc.
Product-nfs-utilsenterprise_linuxopenshift_container_platformRed Hat Ceph Storage 8Red Hat Enterprise Linux 9Red Hat OpenShift Container Platform 4.17Red Hat OpenShift Container Platform 4.19Red Hat Enterprise Linux 9.4 Extended Update SupportRed Hat Enterprise Linux 9.6 Extended Update SupportRed Hat Enterprise Linux 8Red Hat Enterprise Linux 10Red Hat Enterprise Linux 7Red Hat Enterprise Linux 6Red Hat OpenShift Container Platform 4.18Red Hat OpenShift Container Platform 4.16
CWE ID-CWE-279
Incorrect Execution-Assigned Permissions
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2026-21423
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 0.28%
||
7 Day CHG~0.00%
Published-04 Mar, 2026 | 12:29
Updated-05 Mar, 2026 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an incorrect default permissions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to code execution, denial of service, elevation of privileges, and information disclosure.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFS
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-2915
Assigner-HP Inc.
ShareView Details
Assigner-HP Inc.
CVSS Score-5.2||MEDIUM
EPSS-0.03% / 8.09%
||
7 Day CHG~0.00%
Published-03 Mar, 2026 | 19:25
Updated-09 Mar, 2026 | 18:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HP System Event Utility – Denial of Service

HP System Event Utility might allow denial of service with elevated arbitrary file writes. This potential vulnerability was remediated with HP System Event Utility version 3.2.16.

Action-Not Available
Vendor-HP IncHP Inc.
Product-system_event_utilityHP System Event Utility
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2026-0047
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.4||HIGH
EPSS-0.00% / 0.11%
||
7 Day CHG~0.00%
Published-02 Mar, 2026 | 18:43
Updated-06 Mar, 2026 | 04:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In dumpBitmapsProto of ActivityManagerService.java, there is a possible way for an app to access private information due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2026-27653
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 2.36%
||
7 Day CHG~0.00%
Published-27 Feb, 2026 | 05:39
Updated-17 Mar, 2026 | 15:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The installers for multiple products provided by Soliton Systems K.K. contain an issue with incorrect default permissions, which may allow arbitrary code to be executed with SYSTEM privileges.

Action-Not Available
Vendor-solitonSoliton Systems K.K.
Product-securebrowser_iisecurebrowser_for_onegatesecureworkspaceSoliton SecureBrowser IISoliton SecureBrowser for OneGateSoliton SecureWorkspace (formerly WrappingBox)
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-863
Incorrect Authorization
CVE-2026-23703
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.5||HIGH
EPSS-0.02% / 4.30%
||
7 Day CHG~0.00%
Published-26 Feb, 2026 | 05:39
Updated-27 Feb, 2026 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The installer of FinalCode Client provided by Digital Arts Inc. contains an incorrect default permissions vulnerability. A non-administrative user may execute arbitrary code with SYSTEM privilege.

Action-Not Available
Vendor-Digital Arts Inc.
Product-FinalCode Ver.5 seriesFinalCode Ver.6 series
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-1789
Assigner-Genetec Inc.
ShareView Details
Assigner-Genetec Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.02% / 4.08%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 18:47
Updated-26 Apr, 2026 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Local privilege escalation in Genetec Update Service. An authenticated, low-privileged, Windows user could exploit this vulnerability to gain elevated privileges on the affected system.

Action-Not Available
Vendor-genetecGenetec Inc.
Product-genetec_update_serviceGenetec Update Service
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-1772
Assigner-Hitachi Energy
ShareView Details
Assigner-Hitachi Energy
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 3.12%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 13:03
Updated-28 Feb, 2026 | 02:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RTU500 web interface: An unprivileged user can read user management information. The information cannot be accessed via the RTU500 web user interface but requires further tools like browser development utilities to access them without required privileges.

Action-Not Available
Vendor-Hitachi Energy Ltd.
Product-rtu540_firmwarertu560rtu530_firmwarertu530rtu520_firmwarertu560_firmwarertu520rtu540RTU500 series CMU firmware
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2026-2026
Assigner-Tenable Network Security, Inc.
ShareView Details
Assigner-Tenable Network Security, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 1.90%
||
7 Day CHG~0.00%
Published-13 Feb, 2026 | 16:14
Updated-24 Feb, 2026 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control Allows Denial of Service

A vulnerability has been identified where weak file permissions in the Nessus Agent directory on Windows hosts could allow unauthorized access, potentially permitting Denial of Service (DoS) attacks.

Action-Not Available
Vendor-Microsoft CorporationTenable, Inc.
Product-nessus_agentwindowsAgent
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-23857
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-8.2||HIGH
EPSS-0.01% / 2.36%
||
7 Day CHG~0.00%
Published-12 Feb, 2026 | 02:05
Updated-26 Feb, 2026 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Update Package (DUP) Framework, versions 23.12.00 through 24.12.00, contains an Improper Handling of Insufficient Permissions or Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

Action-Not Available
Vendor-Dell Inc.
Product-update_package_frameworkUpdate Package
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2026-20630
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 2.79%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 22:58
Updated-02 Apr, 2026 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe 26.3. An app may be able to access protected user data.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-277
Insecure Inherited Permissions
CVE-2025-36522
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 2.36%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 16:26
Updated-10 Feb, 2026 | 21:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions for some Intel(R) Chipset Software before version 10.1.20266.8668 or later. within Ring 3: User Applications may allow an escalation of privilege. System software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Action-Not Available
Vendor-n/a
Product-Intel(R) Chipset Software
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-36511
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 0.22%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 16:26
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions for some Intel(R) Memory and Storage Tool before version 2.5.2 within Ring 3: User Applications may allow an escalation of privilege. System software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Action-Not Available
Vendor-n/a
Product-Intel(R) Memory and Storage Tool
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-32453
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 0.22%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 16:25
Updated-20 Apr, 2026 | 12:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions for some Intel(R) Graphics Driver software within Ring 2: Privileged Process may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i3-7300tcore_i5-10600kcore_i3-10110ycore_ultra_5_235hxgraphics_drivercore_i7-8700bcore_i9-10900fcore_i5-10400tcore_i7-8700tcore_ultra_5_235hcore_i7-8665uecore_m3-7y30core_i3-10305core_i7-9700fcore_i9-10900tcore_i5-7500tcore_i9-10885hcore_i3-10320core_ultra_7_155hlcore_i3-8300iris_plus_graphics_640core_i7-8550ucore_i7-1065g7graphics_softwarecore_ultra_7_265harc_a310uhd_graphics_600uhd_graphicscore_i7-8086kcore_i3-8121ucore_i3-7320core_i5-8365ucore_i7-7820hqcore_i9-9900tcore_i5-8350ucore_i5-8500core_i5-1030g7core_i5-8279ucore_i7-7500ucore_i5-10210ycore_i3-1000g4core_i7-10700fcore_i3-8100hcore_i5-10600tlinux_intel_lts_kernelcore_i5-7300ucore_i5-7360ucore_ultra_7_255hcore_i5-8300hcore_ultra_5_125hlcore_ultra_7_258vcore_ultra_5_225tcore_ultra_7_356huhd_graphics_750core_i5-8305gcore_i7-10610ucore_ultra_7_155ucore_i5-7600core_m3-7y32arc_b390core_i7-7660ucore_ultra_7_366hcore_i7-10870hcore_i7-9700kcore_ultra_9_285hxcore_i3-8100bcore_ultra_7_266vcore_ultra_9_288vcore_i7-10700tcore_ultra_5_135ucore_i7-7560ucore_i7-7920hqiris_plus_graphics_645core_i7-10700core_ultra_5_322core_ultra_5_245hxcore_i7-1060ng7uhd_graphics_610arc_b370core_ultra_5_332core_i7-8706gcore_i9-9900karc_130vcore_ultra_7_256vcore_ultra_9_275hxcore_ultra_9_185hcore_i5-8259ucore_i7-10700kfcore_i3-10325core_i5-7500core_i3-1000g1core_i3-7102earc_a770mcore_i9-10850karc_a380core_i3-7100tcore_i7-10850hcore_i7-7700kcore_i9-10900tecore_i3-8300tcore_ultra_5_245core_i5-10505core_i7-10810ucore_i5-10210ucore_i5-7200ucore_i9-10980hkcore_i3-7100ucore_i5-10400core_i7-10510ucore_ultra_7_165ulcore_i9-10900core_ultra_5_245tcore_i3-10100core_i3-10100ecore_i7-9700tecore_i7-8569ucore_i3-1000ng4core_i5-7440hqcore_i3-7100core_i3-8109ucore_i3-8145ucore_ultra_7_265tcore_i5-1038ng7core_i5-7400core_i7-8750hcore_ultra_7_365core_i5-10600kfcore_i5-8250uarc_pro_b50arc_b580core_i7-8705ghd_graphics_610core_i3-7100hcore_ultra_7_265ucore_i7-8850hcore_ultra_5_135harc_a570mcore_ultra_7_164ucore_i5-1035g7core_i7-7600uuhd_graphics_620uhd_graphics_630core_ultra_5_236vcore_ultra_5_225ucore_ultra_7_155ulcore_i3-7101tecore_i7-9700tcore_i7-7820eqcore_ultra_5_338hcore_i7-10700tehd_graphics_630uhd_graphics_615core_ultra_7_355core_i3-7101earc_140tcore_i9-10900ecore_i3-10100tcore_ultra_5_134ucore_i5-8500tcore_i5-10500hcore_i7-9750hfcore_i5-10200hcore_i5-7y57arc_a750core_i5-10400hcore_ultra_3_105ulcore_ultra_7_255hxcore_i7-10510ycore_i5-8600core_i5-7442eqcore_i5-7267ucore_i7-10700earc_a730mcore_i3-8100hd_graphics_620core_i5-8500bcore_i7-8557ucore_i7-10750hcore_i5-7600kcore_i7-10875hcore_i7-8700iris_plus_graphics_655core_ultra_9_285core_i7-1060g7core_ultra_7_265core_ultra_9_285hcore_i3-7167ucore_i7-9700kfarc_pro_b60core_i5-7600tcore_i7-7y75core_ultra_5_238varc_130tcore_ultra_7_165ucore_ultra_5_235tcore_i5-1035g1core_i3-8350kcore_i9-10910core_i7-9750hcore_i3-7300core_ultra_7_265hxcore_i5-8600kcore_ultra_5_135ulcore_i9-9880hcore_i5-8257ucore_i5-10310ucore_i5-10500tcore_i7-7567uarc_a580core_i5-7260ucore_i5-10500tecore_i3-10110ucore_i7-8809gcore_i5-8265ucore_i5-7287ucore_i7-9700core_i5-10500ecore_ultra_7_155hcore_i3-7100ecore_ultra_7_265karc_a530mcore_ultra_5_225core_i3-10300core_i7-9850hearc_a370mcore_i5-8400bcore_i5-7400tcore_i3-1005g1core_ultra_9_285tcore_i5-8400hcore_ultra_5_336hcore_i7-8650ucore_i5-10500core_ultra_5_335core_ultra_x9_388hhd_graphics_615core_i3-8130ucore_i5-1030ng7core_i3-10105tcore_i9-10900kuhd_graphics_730arc_a550mcore_ultra_7_255ucore_i7-7700hqcore_i3-10300tarc_a350mcore_i9-9900kfcore_ultra_9_285kcore_i5-7300hqcore_i7-8700kcore_i5-8400tceleron_n5095core_i3-8100tcore_ultra_5_225hcore_ultra_5_115ucore_i5-10300hcore_i7-1068ng7core_i5-1030g4core_i5-7y54core_i7-7700core_ultra_5_125hcore_i5-10400fcore_i3-8145uecore_ultra_5_325core_ultra_5_228vcore_ultra_5_245kcore_i5\+8400core_i7-8500ycore_i7-8709gcore_i7-9850harc_a770core_i3-10105core_i5-10600core_i7-7700tcore_ultra_7_268vcore_i3-10100tecore_i5-10310ycore_ultra_5_235core_i7-10700kcore_i3-7020ucore_i7-7820hkiris_plus_graphics_650core_i7-10710ucore_i9-10900kfcore_i5-8269ucore_i5-7440eqcore_ultra_7_165hcore_i5-8600tcore_ultra_5_135hlarc_140vcore_m3-8100ycore_i5-1035g4core_i5-8260uarc_b570core_i5-8200ycore_i9-9900kscore_i3-7130ucore_ultra_7_165hlcore_i3-10305tcore_i3-10100fcore_ultra_x7_358hcore_i3-7350kcore_i7-8559ucore_ultra_9_386hcore_ultra_5_226vcore_ultra_5_235ucore_i3-8140ucore_i7\+8700core_i7-9850hlcore_i5-8365uecore_i3-10100ycore_i5-8310ycore_i9-9980hkuhd_graphics_605core_ultra_5_125ulcore_ultra_5_125ucore_i7-8565ucore_i7-8665ucore_i5\+8500core_i7-9700ecore_i5-8400core_i9-9900core_i5-8210ycore_i3-10105fIntel(R) Graphics Driver software
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-32092
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 0.22%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 16:25
Updated-20 Apr, 2026 | 12:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions for some Intel(R) Graphics Software before version 25.30.1702.0 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Action-Not Available
Vendor-n/aIntel Corporation
Product-arc_b370core_ultra_3_105ulcore_ultra_5_332core_ultra_7_255hxarc_130vcore_ultra_5_235hxarc_a550mcore_ultra_7_255ucore_ultra_7_256vgraphics_driverarc_a730mcore_ultra_9_275hxcore_ultra_5_235hcore_ultra_9_185harc_a350mcore_ultra_9_285arc_a770mcore_ultra_7_265core_ultra_7_155hlcore_ultra_9_285kcore_ultra_9_285harc_a380arc_pro_b60core_ultra_5_225harc_pro_a50core_ultra_5_115ucore_ultra_5_245core_ultra_5_238vcore_ultra_7_165uarc_130tcore_ultra_5_235tgraphics_softwarecore_ultra_7_265harc_a310core_ultra_5_125hcore_ultra_7_165ulcore_ultra_5_245tcore_ultra_7_265hxcore_ultra_5_325core_ultra_5_228vcore_ultra_5_245kcore_ultra_5_135ularc_a770arc_pro_a30mcore_ultra_7_268vcore_ultra_7_265tcore_ultra_5_235core_ultra_7_365arc_pro_a40arc_a580arc_pro_b50arc_b580arc_pro_a60mcore_ultra_7_165hcore_ultra_5_135hlarc_140vcore_ultra_7_265ucore_ultra_5_135hcore_ultra_7_155hlinux_intel_lts_kernelarc_a570mcore_ultra_7_164ucore_ultra_7_265karc_a530mcore_ultra_5_225core_ultra_7_255harc_b570core_ultra_5_236vcore_ultra_5_225ucore_ultra_7_155ularc_a370mcore_ultra_5_125hlcore_ultra_7_258vcore_ultra_5_225tcore_ultra_7_165hlcore_ultra_7_356hcore_ultra_x7_358hcore_ultra_9_386hcore_ultra_9_285tarc_pro_a60core_ultra_5_226vcore_ultra_5_336hcore_ultra_7_155ucore_ultra_5_338hcore_ultra_5_235ucore_ultra_5_335core_ultra_x9_388harc_b390core_ultra_7_366hcore_ultra_7_355core_ultra_9_285hxarc_140tcore_ultra_7_266vcore_ultra_9_288vcore_ultra_5_125ulcore_ultra_5_125ucore_ultra_5_134ucore_ultra_5_135ucore_ultra_5_322core_ultra_5_245hxarc_a750Intel(R) Graphics Software
CWE ID-CWE-277
Insecure Inherited Permissions
CVE-2025-31655
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 2.36%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 16:25
Updated-10 Feb, 2026 | 21:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions for some Intel(R) Battery Life Diagnostic Tool within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Action-Not Available
Vendor-n/a
Product-Intel(R) Battery Life Diagnostic Tool
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-22849
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 0.22%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 16:25
Updated-11 Feb, 2026 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions for the Intel(R) Optane(TM) PMem management software before versions CR_MGMT_01.00.00.3584, CR_MGMT_02.00.00.4052, CR_MGMT_03.00.00.0538 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Action-Not Available
Vendor-n/a
Product-Intel(R) Optane(TM) PMem management software
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-25931
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.97%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 22:10
Updated-10 Feb, 2026 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
vscode-spell-checker has a workspace-trust bypass Code Execution

vscode-spell-checker is a basic spell checker that works well with code and documents. Prior to v4.5.4, DocumentSettings._determineIsTrusted treats the configuration value cSpell.trustedWorkspace as the authoritative trust flag. The value defaults to true (package.json) and is read from workspace configuration each time settings are fetched. The code coerces any truthy value to true and forwards it to ConfigLoader.setIsTrusted , which in turn allows JavaScript/TypeScript configuration files ( .cspell.config.js/.mjs/.ts , etc.) to be located and executed. Because no VS Code workspace-trust state is consulted, an untrusted workspace can keep the flag true and place a malicious .cspell.config.js ; opening the workspace causes the extension host to execute attacker-controlled Node.js code with the user’s privileges. This vulnerability is fixed in v4.5.4.

Action-Not Available
Vendor-streetsidesoftware
Product-vscode-spell-checker
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-807
Reliance on Untrusted Inputs in a Security Decision
CWE ID-CWE-829
Inclusion of Functionality from Untrusted Control Sphere
CVE-2020-37160
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.5||HIGH
EPSS-0.01% / 0.28%
||
7 Day CHG~0.00%
Published-06 Feb, 2026 | 23:14
Updated-17 Feb, 2026 | 16:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SprintWork 2.3.1 - Local Privilege Escalation

SprintWork 2.3.1 contains multiple local privilege escalation vulnerabilities through insecure file, service, and folder permissions on Windows systems. Local unprivileged users can exploit missing executable files and weak service configurations to create a new administrative user and gain complete system access.

Action-Not Available
Vendor-Veridium
Product-SprintWork
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-15333
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 2.21%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 18:20
Updated-10 Feb, 2026 | 17:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an information disclosure vulnerability in Threat Response.

Tanium addressed an information disclosure vulnerability in Threat Response.

Action-Not Available
Vendor-taniumTanium
Product-threat_responseThreat Response
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-15334
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 2.21%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 18:18
Updated-10 Feb, 2026 | 17:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an information disclosure vulnerability in Threat Response.

Tanium addressed an information disclosure vulnerability in Threat Response.

Action-Not Available
Vendor-taniumTanium
Product-threat_responseThreat Response
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-15335
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 2.21%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 18:17
Updated-10 Feb, 2026 | 17:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an information disclosure vulnerability in Threat Response.

Tanium addressed an information disclosure vulnerability in Threat Response.

Action-Not Available
Vendor-taniumTanium
Product-threat_responseThreat Response
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-15341
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 1.73%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 18:16
Updated-10 Feb, 2026 | 18:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an incorrect default permissions vulnerability in Benchmark.

Tanium addressed an incorrect default permissions vulnerability in Benchmark.

Action-Not Available
Vendor-taniumTanium
Product-benchmarkBenchmark
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-15339
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 1.73%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 18:16
Updated-10 Feb, 2026 | 18:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an incorrect default permissions vulnerability in Discover.

Tanium addressed an incorrect default permissions vulnerability in Discover.

Action-Not Available
Vendor-taniumTanium
Product-discoverDiscover
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-15340
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 1.29%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 18:16
Updated-10 Feb, 2026 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an incorrect default permissions vulnerability in Comply.

Tanium addressed an incorrect default permissions vulnerability in Comply.

Action-Not Available
Vendor-taniumTanium
Product-complyComply
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-15338
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 1.73%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 18:16
Updated-10 Feb, 2026 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an incorrect default permissions vulnerability in Partner Integration.

Tanium addressed an incorrect default permissions vulnerability in Partner Integration.

Action-Not Available
Vendor-taniumTanium
Product-partner_integrationPartner Integration
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-15336
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 1.29%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 18:16
Updated-10 Feb, 2026 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an incorrect default permissions vulnerability in Performance.

Tanium addressed an incorrect default permissions vulnerability in Performance.

Action-Not Available
Vendor-taniumTanium
Product-performancePerformance
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-15337
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 1.73%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 18:16
Updated-10 Feb, 2026 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an incorrect default permissions vulnerability in Patch.

Tanium addressed an incorrect default permissions vulnerability in Patch.

Action-Not Available
Vendor-taniumTanium
Product-patchPatch
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-15343
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 1.73%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 18:11
Updated-10 Feb, 2026 | 17:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed an incorrect default permissions vulnerability in Enforce.

Tanium addressed an incorrect default permissions vulnerability in Enforce.

Action-Not Available
Vendor-taniumTanium
Product-enforceEnforce
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2020-37129
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.5||HIGH
EPSS-0.01% / 3.41%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 16:13
Updated-05 Mar, 2026 | 01:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Memu Play 7.1.3 - Insecure Folder Permissions

Memu Play 7.1.3 contains an insecure folder permissions vulnerability that allows low-privileged users to modify the MemuService.exe executable. Attackers can replace the service executable with a malicious file during system restart to gain SYSTEM-level privileges by exploiting unrestricted file modification permissions.

Action-Not Available
Vendor-Microvirt
Product-Memu Play
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-10314
Assigner-Mitsubishi Electric Corporation
ShareView Details
Assigner-Mitsubishi Electric Corporation
CVSS Score-8.8||HIGH
EPSS-0.01% / 0.77%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 03:07
Updated-05 Feb, 2026 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Malicious Code Execution Vulnerability in Mitsubishi Small-Capacity UPS Shutdown Software FREQSHIP-mini for Windows

Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation FREQSHIP-mini for Windows versions 8.0.0 to 8.0.2 allows a local attacker to execute arbitrary code with system privileges by replacing service executable files (EXE) or DLLs in the installation directory with specially crafted files. As a result, the attacker may be able to disclose, tamper with, delete, or destroy information stored on the PC where the affected product is installed, or cause a Denial of Service (DoS) condition on the affected system.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-FREQSHIP-mini for Windows
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-67848
Assigner-Fedora Project
ShareView Details
Assigner-Fedora Project
CVSS Score-8.1||HIGH
EPSS-0.05% / 14.18%
||
7 Day CHG-0.01%
Published-03 Feb, 2026 | 10:51
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Moodle: moodle: authentication bypass via lti provider allows suspended users to gain unauthorized access.

A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the user's suspension status, enabling unauthorized access to the system. This can lead to information disclosure or other unauthorized actions by users who should be restricted.

Action-Not Available
Vendor-Moodle Pty Ltd
Product-moodle
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2025-69875
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.72%
||
7 Day CHG~0.00%
Published-03 Feb, 2026 | 00:00
Updated-11 Feb, 2026 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in Quick Heal Total Security 23.0.0 in the quarantine management component where insufficient validation of restore paths and improper permission handling allow a low-privileged local user to restore quarantined files into protected system directories. This behavior can be abused by a local attacker to place files in high-privilege locations, potentially leading to privilege escalation.

Action-Not Available
Vendor-quickhealn/a
Product-total_securityn/a
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-281
Improper Preservation of Permissions
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2026-24780
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-0.12% / 30.31%
||
7 Day CHG~0.00%
Published-29 Jan, 2026 | 17:39
Updated-17 Feb, 2026 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AutoGPT is Vulnerable to RCE via Disabled Block Execution

AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.44, AutoGPT Platform's block execution endpoints (both main web API and external API) allow executing blocks by UUID without checking the `disabled` flag. Any authenticated user can execute the disabled `BlockInstallationBlock`, which writes arbitrary Python code to the server filesystem and executes it via `__import__()`, achieving Remote Code Execution. In default self-hosted deployments where Supabase signup is enabled, an attacker can self-register; if signup is disabled (e.g., hosted), the attacker needs an existing account. autogpt-platform-beta-v0.6.44 contains a fix.

Action-Not Available
Vendor-agptSignificant-Gravitas
Product-autogpt_platformAutoGPT
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2026-24414
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.00% / 0.16%
||
7 Day CHG~0.00%
Published-29 Jan, 2026 | 17:35
Updated-10 Mar, 2026 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Icinga for Windows certificate can have too-open permissions

The Icinga PowerShell Framework provides configuration and check possibilities to ensure integration and monitoring of Windows environments. In versions prior to 1.13.4, 1.12.4, and 1.11.2, permissions of the Icinga for Windows `certificate` directory grant every user read access, which results in the exposure of private key of the Icinga certificate for the given host. All installations are affected. Versions 1.13.4, 1.12.4, and 1.11.2 contains a patch. Please note that upgrading to a fixed version of Icinga for Windows will also automatically fix a similar issue present in Icinga 2, CVE-2026-24413. As a workaround, the permissions can be restricted manually by updating the ACL for the given folder `C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate` (and `C:\ProgramData\icinga2\var` to fix the issue for the Icinga 2 agent as well) including every sub-folder and item to restrict access for general users, only allowing the Icinga service user and administrators access.

Action-Not Available
Vendor-icingaIcinga
Product-icinga_powershell_frameworkicinga-powershell-framework
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-24413
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 0.87%
||
7 Day CHG~0.00%
Published-29 Jan, 2026 | 17:21
Updated-19 Feb, 2026 | 20:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Icinga has insecure permission of %ProgramData%\icinga2\var on Windows

Icinga 2 is an open source monitoring system. Starting in version 2.3.0 and prior to versions 2.13.14, 2.14.8, and 2.15.2, the Icinga 2 MSI did not set appropriate permissions for the `%ProgramData%\icinga2\var` folder on Windows. This resulted in the its contents - including the private key of the user and synced configuration - being readable by all local users. All installations on Windows are affected. Versions 2.13.14, 2.14.8, and 2.15.2 contains a fix. There are two possibilities to work around the issue without upgrading Icinga 2. Upgrade Icinga for Windows to at least version v1.13.4, v1.12.4, or v1.11.2. These version will automatically fix the ACLs for the Icinga 2 agent as well. Alternatively, manually update the ACL for the given folder `C:\ProgramData\icinga2\var` (and `C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate` to fix the issue for the Icinga for Windows as well) including every sub-folder and item to restrict access for general users, only allowing the Icinga service user and administrators access.

Action-Not Available
Vendor-icingaIcingaMicrosoft Corporation
Product-icingawindowsicinga2
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-13905
Assigner-Schneider Electric
ShareView Details
Assigner-Schneider Electric
CVSS Score-7||HIGH
EPSS-0.02% / 3.76%
||
7 Day CHG~0.00%
Published-29 Jan, 2026 | 15:20
Updated-29 Jan, 2026 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CWE-276: Incorrect Default Permissions vulnerability exists that could cause privilege escalation through the reverse shell when one or more executable service binaries are modified in the installation folder by a local user with normal privilege upon service restart.

Action-Not Available
Vendor-Schneider Electric SE
Product-EcoStruxure™ Process Expert for AVEVA System PlatformEcoStruxure™ Process Expert
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-69604
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.82%
||
7 Day CHG~0.00%
Published-29 Jan, 2026 | 00:00
Updated-13 Feb, 2026 | 20:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Shirt Pocket's SuperDuper! 3.11 and earlier allow a local attacker to modify the default task template to install an arbitrary package that can run shell scripts with root privileges and Full Disk Access, thus bypassing macOS privacy controls.

Action-Not Available
Vendor-shirt-pocketn/a
Product-superduper\!n/a
CWE ID-CWE-276
Incorrect Default Permissions
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 41
  • 42
  • Next