CVE-2026-3315
Received Received - Intake
Incorrect Permissions in ASSA ABLOY Visionline Allow Privilege Escalation

Publication date: 2026-03-10

Last updated on: 2026-03-11

Assigner: National Cyber Security Centre Finland

Description
Incorrect Default Permissions, : Execution with Unnecessary Privileges, : Incorrect Permission Assignment for Critical Resource vulnerability in ASSA ABLOY Visionline on Windows allows Configuration/Environment Manipulation.This issue affects Visionline: from 1.0 before 1.33.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-10
Last Modified
2026-03-11
Generated
2026-05-07
AI Q&A
2026-03-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
assa_abloy visionline From 1.0 (inc) to 1.33 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-732 The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
CWE-276 During installation, installed file permissions are set to allow anyone to modify those files.
CWE-250 The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves incorrect default permissions and execution with unnecessary privileges in ASSA ABLOY Visionline on Windows. It allows configuration or environment manipulation due to incorrect permission assignment for critical resources. The issue affects Visionline versions from 1.0 up to but not including 1.33.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized manipulation of configuration or environment settings in the affected software. Because it involves execution with unnecessary privileges and incorrect permission assignments, it may allow attackers or unauthorized users to alter critical resources, potentially compromising system integrity or security.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart