Chef InSpec up to version 5.23 creates named pipes with overly permissive default Windows access controls. A local attacker may interfere with the pipe connection process and exploit the insufficient access restrictions to assume the InSpec execution context, potentially resulting in elevated privileges or operational disruption. This issue affects Chef Inspec: through 5.23.
References
History

Fri, 30 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
Description Chef InSpec up to version 5.23 creates named pipes with overly permissive default Windows access controls. A local attacker may interfere with the pipe connection process and exploit the insufficient access restrictions to assume the InSpec execution context, potentially resulting in elevated privileges or operational disruption. This issue affects Chef Inspec: through 5.23.
Title Untrusted user data can lead to privilege escalation
Weaknesses CWE-269
CWE-287
References
Metrics cvssV4_0

{'score': 5.8, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ProgressSoftware

Published: 2026-01-30T14:09:41.182Z

Updated: 2026-01-30T14:44:30.165Z

Reserved: 2025-06-26T14:24:52.468Z

Link: CVE-2025-6723

cve-icon Vulnrichment

Updated: 2026-01-30T14:44:20.194Z

cve-icon NVD

Status : Received

Published: 2026-01-30T14:16:06.510

Modified: 2026-01-30T14:16:06.510

Link: CVE-2025-6723

cve-icon Redhat

No data.