{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-50914","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-02T22:23:43.874Z","dateReserved":"2023-12-15T00:00:00.000Z","datePublished":"2024-04-30T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2024-04-30T13:52:08.325Z"},"descriptions":[{"lang":"en","value":"A Privilege Escalation issue in the inter-process communication procedure from GOG Galaxy (Beta) 2.0.67.2 through v2.0.71.2 allows authentictaed users to change the DACL of arbitrary system directories to include Everyone full control permissions by modifying the FixDirectoryPrivileges instruction parameters sent from GalaxyClient.exe to GalaxyClientService.exe."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://www.positronsecurity.com/blog/2020-08-13-gog-galaxy_client-local-privilege-escalation_deuce/"},{"url":"https://support.gog.com/hc/en-us/categories/201553005-Downloads-Installing?product=gog"},{"url":"https://github.com/anvilsecure/gog-galaxy-app-research"},{"url":"https://github.com/anvilsecure/gog-galaxy-app-research/blob/main/advisories/CVE-2023-50914%20-%20LPE.md"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-279","lang":"en","description":"CWE-279 Incorrect Execution-Assigned Permissions"}]}],"affected":[{"vendor":"gog","product":"galaxy","cpes":["cpe:2.3:a:gog:galaxy:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.0.67.2","status":"affected","lessThanOrEqual":"v2.071.2","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.7,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"HIGH","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-07-16T19:16:30.967116Z","id":"CVE-2023-50914","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-16T19:20:57.450Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T22:23:43.874Z"},"title":"CVE Program Container","references":[{"url":"https://www.positronsecurity.com/blog/2020-08-13-gog-galaxy_client-local-privilege-escalation_deuce/","tags":["x_transferred"]},{"url":"https://support.gog.com/hc/en-us/categories/201553005-Downloads-Installing?product=gog","tags":["x_transferred"]},{"url":"https://github.com/anvilsecure/gog-galaxy-app-research","tags":["x_transferred"]},{"url":"https://github.com/anvilsecure/gog-galaxy-app-research/blob/main/advisories/CVE-2023-50914%20-%20LPE.md","tags":["x_transferred"]}]}]}}