Exploit Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on April 23rd, 2019 📆 | 3008 Views ⚑

0

Check Point ZoneAlarm/Endpoint Security Client on Windows Log File Archive privilege escalation

CVSS Meta Temp Score Current Exploit Price (≈)
5.1 $0-$5k

A vulnerability was found in Check Point ZoneAlarm and Endpoint Security Client on Windows (Firewall Software). It has been rated as critical. This issue affects some processing of the component Log File Archive Handler. The manipulation with an unknown input leads to a privilege escalation vulnerability. Using CWE to declare the problem leads to CWE-269. Impacted is confidentiality, integrity, and availability.

The weakness was presented 04/22/2019. The identification of this vulnerability is CVE-2019-8452 since 02/18/2019. An attack has to be approached locally. A single authentication is necessary for exploitation. Neither technical details nor an exploit are publicly available.

Upgrading eliminates this vulnerability.

Vendor

Name

VulDB Meta Base Score: 5.3
VulDB Meta Temp Score: 5.1

VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: ?
VulDB Reliability: ?


VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Privilege escalation (CWE-269)
Local: Yes
Remote: No

Availability: ?
Status: Not defined

Price Prediction: ?
Current Price Estimation: ?

Threat Intelligenceinfoedit

Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: Upgrade
Status: ?
0-Day Time: ?02/18/2019 CVE assigned
04/22/2019 +63 days Advisory disclosed
04/23/2019 +1 days VulDB entry created
04/23/2019 +0 days VulDB last updateCVE: CVE-2019-8452 (?)Created: 04/23/2019 09:11 AM
Complete: ?

Comments

No comments yet. Please log in to comment.

Upgrade your account now!

https://vuldb.com/?id.133973

Download Premium WordPress Themes Free
Free Download WordPress Themes
Download Nulled WordPress Themes
Download WordPress Themes Free
online free course

Tagged with:



Leave a Reply ✍


loading...