{"id":"CVE-2023-39004","details":"Insecure permissions in the configuration directory (/conf/) of OPNsense Community Edition before 23.7 and Business Edition before 23.4.2 allow attackers to access sensitive information (e.g., hashed root password) which could lead to privilege escalation.","modified":"2026-04-12T07:18:55.826616Z","published":"2023-08-09T19:15:15.013Z","references":[{"type":"WEB","url":"http://opnsense.com"},{"type":"EVIDENCE","url":"https://logicaltrust.net/blog/2023/08/opnsense.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/opnsense/core","events":[{"introduced":"0"},{"fixed":"497e46956ae0251273189a9ea59dc5128af9e1d9"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"23.7"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:opnsense:opnsense:*:*:*:*:*:*:*:*"}}],"versions":["15.1","15.1.1","15.1.10","15.1.10.2","15.1.11","15.1.11.1","15.1.11.2","15.1.11.3","15.1.11.4","15.1.12","15.1.2","15.1.3","15.1.4","15.1.5","15.1.6","15.1.6.1","15.1.7","15.1.7.1","15.1.7.2","15.1.8","15.1.8.1","15.1.8.2","15.1.8.3","15.1.8.4","15.1.9","15.1.9.1","15.1.9.2","15.7","16.7.a","16.7.b","16.7.r","17.1.a","17.1.b","17.1.r","17.7.a","17.7.b","17.7.r","18.1.a","18.1.b","18.1.r","18.7.a","18.7.b","18.7.r","19.1.a","19.1.b","19.1.r","19.7.a","19.7.b","19.7.r","20.1.a","20.1.b","20.1.r","20.7.a","20.7.b","20.7.r","21.1.a","21.1.b","21.1.r","21.7.a","21.7.b","21.7.r","22.1.a","22.1.b","22.1.r","22.7.a","22.7.b","22.7.r","23.1.a","23.1.b","23.1.r","23.7.a","23.7.b"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-39004.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}