{"uuid": "c706aea9-0717-4845-ac2f-b0320dd0e0b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45159", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16957", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-45159\n\ud83d\udd25 CVSS Score: 8.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: 1E Client installer can perform arbitrary file deletion on protected files.\u00a0\u00a0\n\nA non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. \n\nA hotfix is available from the 1E support portal that forces\u00a0the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID.\n\nfor v8.1 use hotfix Q23097\nfor v8.4 use hotfix Q23105\nfor v9.0 use hotfix Q23115\n\nfor SaaS customers, use 1EClient v23.7 plus hotfix Q23121\n\ud83d\udccf Published: 2023-10-05T10:11:20.065Z\n\ud83d\udccf Modified: 2025-05-20T08:25:59.533Z\n\ud83d\udd17 References:\n1. https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2001/", "creation_timestamp": "2025-05-20T08:39:55.000000Z"}