Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-36495
Awaiting Analysis
More InfoOfficial Page
Source-551230f0-3615-47bd-b7cc-93e92e730bbf
View Known Exploited Vulnerability (KEV) details
Published At-24 Jun, 2024 | 09:15
Updated At-08 Jul, 2024 | 14:18

The application Faronics WINSelect (Standard + Enterprise) saves its configuration in an encrypted file on the file system which "Everyone" has read and write access to, path to file: C:\ProgramData\WINSelect\WINSelect.wsd The path for the affected WINSelect Enterprise configuration file is: C:\ProgramData\Faronics\StorageSpace\WS\WINSelect.wsd

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.7HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-276Secondary551230f0-3615-47bd-b7cc-93e92e730bbf
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://seclists.org/fulldisclosure/2024/Jun/12551230f0-3615-47bd-b7cc-93e92e730bbf
N/A
https://r.sec-consult.com/winselect551230f0-3615-47bd-b7cc-93e92e730bbf
N/A
https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes551230f0-3615-47bd-b7cc-93e92e730bbf
N/A
Change History
0Changes found

Details not found