Lucene search

K
cveForcepointCVE-2019-6145
HistorySep 20, 2019 - 8:15 p.m.

CVE-2019-6145

2019-09-2020:15:11
CWE-428
forcepoint
web.nvd.nist.gov
312
cve-2019-6145
forcepoint
vpn client
windows
vulnerability
unquoted search path
local privilege escalation
system user
safebreach labs
nvd

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs for finding this vulnerability and for reporting it to us.

Affected configurations

Nvd
Node
forcepointvpn_clientRange<6.6.1windows
VendorProductVersionCPE
forcepointvpn_client*cpe:2.3:a:forcepoint:vpn_client:*:*:*:*:*:windows:*:*

CNA Affected

[
  {
    "product": "Forcepoint VPN Client for Windows",
    "vendor": "Forcepoint",
    "versions": [
      {
        "status": "affected",
        "version": "versions earlier than 6.6.1"
      }
    ]
  }
]

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Related for CVE-2019-6145