Chef InSpec up to version 5.23 creates named pipes with overly permissive default Windows access controls. A local attacker may interfere with the pipe connection process and exploit the insufficient access restrictions to assume the InSpec execution context, potentially resulting in elevated privileges or operational disruption.
This issue affects Chef Inspec: through 5.23.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://docs.chef.io/inspec/ |
|
History
Fri, 30 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chef InSpec up to version 5.23 creates named pipes with overly permissive default Windows access controls. A local attacker may interfere with the pipe connection process and exploit the insufficient access restrictions to assume the InSpec execution context, potentially resulting in elevated privileges or operational disruption. This issue affects Chef Inspec: through 5.23. | |
| Title | Untrusted user data can lead to privilege escalation | |
| Weaknesses | CWE-269 CWE-287 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ProgressSoftware
Published: 2026-01-30T14:09:41.182Z
Updated: 2026-01-30T14:44:30.165Z
Reserved: 2025-06-26T14:24:52.468Z
Link: CVE-2025-6723
Updated: 2026-01-30T14:44:20.194Z
Status : Received
Published: 2026-01-30T14:16:06.510
Modified: 2026-01-30T14:16:06.510
Link: CVE-2025-6723
No data.