This issue affects Chef Inspec: through 5.23.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://docs.chef.io/inspec/ |
|
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chef
Chef inspec |
|
| Vendors & Products |
Chef
Chef inspec |
Fri, 30 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chef InSpec up to version 5.23 creates named pipes with overly permissive default Windows access controls. A local attacker may interfere with the pipe connection process and exploit the insufficient access restrictions to assume the InSpec execution context, potentially resulting in elevated privileges or operational disruption. This issue affects Chef Inspec: through 5.23. | |
| Title | Untrusted user data can lead to privilege escalation | |
| Weaknesses | CWE-269 CWE-287 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2026-01-30T14:44:30.165Z
Reserved: 2025-06-26T14:24:52.468Z
Link: CVE-2025-6723
Updated: 2026-01-30T14:44:20.194Z
Status : Awaiting Analysis
Published: 2026-01-30T14:16:06.510
Modified: 2026-02-04T16:34:21.763
Link: CVE-2025-6723
No data.
OpenCVE Enrichment
Updated: 2026-02-02T09:27:35Z