{"api_version":"1","generated_at":"2026-04-22T22:49:42+00:00","cve":"CVE-2023-35800","urls":{"html":"https://cve.report/CVE-2023-35800","api":"https://cve.report/api/cve/CVE-2023-35800.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-35800","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-35800"},"summary":{"title":"CVE-2023-35800","description":"Stormshield Endpoint Security Evolution 2.0.0 through 2.4.2 has Insecure Permissions. An ACL entry on the SES Evolution agent directory that contains the agent logs displayed in the GUI allows interactive users to read data, which could allow access to information reserved to administrators.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-06-27 17:15:00","updated_at":"2023-07-05 13:40:00"},"problem_types":["CWE-732"],"metrics":[],"references":[{"url":"https://advisories.stormshield.eu","name":"https://advisories.stormshield.eu","refsource":"MISC","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://advisories.stormshield.eu/2023-021/","name":"https://advisories.stormshield.eu/2023-021/","refsource":"CONFIRM","tags":[],"title":"SES Evolution superfluous agent directory ACL entry (CVE-2023-35800) | Stormshield security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-35800","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35800","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"35800","vulnerable":"1","versionEndIncluding":"2.4.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"stormshield","cpe5":"endpoint_security","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2023-35800","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Stormshield Endpoint Security Evolution 2.0.0 through 2.4.2 has Insecure Permissions. An ACL entry on the SES Evolution agent directory that contains the agent logs displayed in the GUI allows interactive users to read data, which could allow access to information reserved to administrators."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://advisories.stormshield.eu","refsource":"MISC","name":"https://advisories.stormshield.eu"},{"refsource":"CONFIRM","name":"https://advisories.stormshield.eu/2023-021/","url":"https://advisories.stormshield.eu/2023-021/"}]}},"nvd":{"publishedDate":"2023-06-27 17:15:00","lastModifiedDate":"2023-07-05 13:40:00","problem_types":["CWE-732"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndIncluding":"2.4.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}