When configuring Arc (e.g. during the first setup), a local web interface is provided to ease the configuration process. Such web interface lacks authentication and may thus be abused by a local attacker or malware running on the machine itself.



A malicious local user or process, during a window of opportunity when the local web interface is active, may be able to extract sensitive information or change Arc's configuration. This could also lead to arbitrary code execution if a malicious update package is installed.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-58207 When configuring Arc (e.g. during the first setup), a local web interface is provided to ease the configuration process. Such web interface lacks authentication and may thus be abused by a local attacker or malware running on the machine itself. A malicious local user or process, during a window of opportunity when the local web interface is active, may be able to extract sensitive information or change Arc's configuration. This could also lead to arbitrary code execution if a malicious update package is installed.
Fixes

Solution

Upgrade to v1.6.0 or later.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2024-08-02T08:14:25.128Z

Reserved: 2023-11-02T15:59:45.788Z

Link: CVE-2023-5935

cve-icon Vulnrichment

Updated: 2024-08-02T08:14:25.128Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-15T16:15:09.020

Modified: 2024-11-21T08:42:48.670

Link: CVE-2023-5935

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses