Lucene search

K
cve[email protected]CVE-2020-13162
HistoryJun 16, 2020 - 8:15 p.m.

CVE-2020-13162

2020-06-1620:15:13
CWE-367
web.nvd.nist.gov
87
cve-2020-13162
pulsesecureservice
vulnerability
windows
nt authority/system
nvd

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.1%

A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.

Affected configurations

NVD
Node
pulsesecurepulse_secure_desktop_clientMatch5.3r1.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch5.3r1.1windows
OR
pulsesecurepulse_secure_desktop_clientMatch5.3r2.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch5.3r3.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch5.3r4.1windows
OR
pulsesecurepulse_secure_desktop_clientMatch5.3r4.2windows
OR
pulsesecurepulse_secure_desktop_clientMatch5.3r5.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch5.3r5.2windows
OR
pulsesecurepulse_secure_desktop_clientMatch5.3r6.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch5.3r7.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.0r1.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.0r2windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.0r2.1windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.0r3windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.0r3.2windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.0r4windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.0r4.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.0r5.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.0r6.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r1.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r2.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r3.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r3.1windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r4.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r4.1windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r4.2windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r5.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r6.0windows
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r7.0windows
OR
pulsesecurepulse_secure_installer_serviceMatch8.3windows
OR
pulsesecurepulse_secure_installer_serviceMatch9.1windows
OR
pulsesecurepulse_secure_installer_serviceMatch9.1r5.0windows

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.1%