CVE-2023-47172

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in WithSecure security products. An authenticated local attacker could exploit this to gain elevated privileges on affected systems. The vulnerability impacts WithSecure Client Security, Server Security, Email and Server Security, and Elements Endpoint Protection.

💻 Affected Systems

Products:
  • WithSecure Client Security
  • WithSecure Server Security
  • WithSecure Email and Server Security
  • WithSecure Elements Endpoint Protection
Versions: Client Security 15, Server Security 15, Email and Server Security 15, Elements Endpoint Protection 17 and later
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Windows and Linux versions of the products. Requires local authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could gain SYSTEM/root privileges, potentially compromising the entire endpoint and accessing sensitive data or installing persistent malware.

🟠

Likely Case

Malicious insider or compromised user account could elevate privileges to install additional malware, disable security controls, or access restricted system resources.

🟢

If Mitigated

With proper patch management and least privilege principles, impact is limited to isolated incidents that can be quickly contained and investigated.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access to the system.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Local privilege escalation vulnerabilities typically have low exploitation complexity once the vulnerability details are understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.withsecure.com/en/support/security-advisories/cve-2023-47172

Restart Required: Yes

Instructions:

1. Review the WithSecure security advisory. 2. Update affected products to the latest patched version. 3. Restart systems to apply updates. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict local access

all

Limit local user access to systems running affected WithSecure products

Implement least privilege

all

Ensure users only have necessary privileges and cannot run arbitrary executables

🧯 If You Can't Patch

  • Implement strict access controls and monitor for privilege escalation attempts
  • Isolate affected systems and limit their access to critical network resources

🔍 How to Verify

Check if Vulnerable:

Check installed WithSecure product versions against affected versions listed in the advisory

Check Version:

Check WithSecure product interface or documentation for version check command specific to each product

Verify Fix Applied:

Verify product version is updated beyond affected versions and check for successful update completion

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events
  • WithSecure service failures or restarts
  • Unexpected process creation with elevated privileges

Network Indicators:

  • Unusual outbound connections from systems running affected products

SIEM Query:

Search for process creation events where parent process is WithSecure-related and child process has elevated privileges

🔗 References

📤 Share & Export