Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-5722

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-11 Oct, 2017 | 00:00
Updated At-16 Sep, 2024 | 22:35
Rejected At-
Credits

Incorrect policy enforcement in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows attackers with local or physical access to bypass enforcement of integrity protections via manipulation of firmware storage.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:11 Oct, 2017 | 00:00
Updated At:16 Sep, 2024 | 22:35
Rejected At:
â–¼CVE Numbering Authority (CNA)

Incorrect policy enforcement in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows attackers with local or physical access to bypass enforcement of integrity protections via manipulation of firmware storage.

Affected Products
Vendor
Intel CorporationIntel Corporation
Product
NUC Kits
Versions
Affected
  • BN0049 and below
Problem Types
TypeCWE IDDescription
textN/AElevation of Privilege
Type: text
CWE ID: N/A
Description: Elevation of Privilege
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084&languageid=en-fr
x_refsource_CONFIRM
http://www.securityfocus.com/bid/101236
vdb-entry
x_refsource_BID
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084&languageid=en-fr
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/101236
Resource:
vdb-entry
x_refsource_BID
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084&languageid=en-fr
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/101236
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084&languageid=en-fr
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/101236
Resource:
vdb-entry
x_refsource_BID
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:11 Oct, 2017 | 00:29
Updated At:20 Apr, 2025 | 01:37

Incorrect policy enforcement in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows attackers with local or physical access to bypass enforcement of integrity protections via manipulation of firmware storage.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.5HIGH
CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Primary2.04.4MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.0
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 4.4
Base severity: MEDIUM
Vector:
AV:L/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

Intel Corporation
intel
>>nuc7i7bnh_firmware>>ayaplcel.86a.0041
cpe:2.3:o:intel:nuc7i7bnh_firmware:ayaplcel.86a.0041:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i7bnh_firmware>>bnkbl357.86a.0052
cpe:2.3:o:intel:nuc7i7bnh_firmware:bnkbl357.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i7bnh_firmware>>ccsklm5v.86a.0052
cpe:2.3:o:intel:nuc7i7bnh_firmware:ccsklm5v.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i7bnh_firmware>>ccsklm30.86a.0052
cpe:2.3:o:intel:nuc7i7bnh_firmware:ccsklm30.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i7bnh_firmware>>dnkbli5v.86a.0026
cpe:2.3:o:intel:nuc7i7bnh_firmware:dnkbli5v.86a.0026:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i7bnh_firmware>>dnkbli30.86a.0026
cpe:2.3:o:intel:nuc7i7bnh_firmware:dnkbli30.86a.0026:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i7bnh_firmware>>kyskli70.86a.0050
cpe:2.3:o:intel:nuc7i7bnh_firmware:kyskli70.86a.0050:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i7bnh_firmware>>rybdwi35.86a.0366
cpe:2.3:o:intel:nuc7i7bnh_firmware:rybdwi35.86a.0366:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i7bnh_firmware>>syskli35.86a.0062
cpe:2.3:o:intel:nuc7i7bnh_firmware:syskli35.86a.0062:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i7bnh_firmware>>tybyt20h.86a.0015
cpe:2.3:o:intel:nuc7i7bnh_firmware:tybyt20h.86a.0015:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i7bnh>>-
cpe:2.3:h:intel:nuc7i7bnh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnh_firmware>>ayaplcel.86a.0041
cpe:2.3:o:intel:nuc7i5bnh_firmware:ayaplcel.86a.0041:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnh_firmware>>bnkbl357.86a.0052
cpe:2.3:o:intel:nuc7i5bnh_firmware:bnkbl357.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnh_firmware>>ccsklm5v.86a.0052
cpe:2.3:o:intel:nuc7i5bnh_firmware:ccsklm5v.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnh_firmware>>ccsklm30.86a.0052
cpe:2.3:o:intel:nuc7i5bnh_firmware:ccsklm30.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnh_firmware>>dnkbli5v.86a.0026
cpe:2.3:o:intel:nuc7i5bnh_firmware:dnkbli5v.86a.0026:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnh_firmware>>dnkbli30.86a.0026
cpe:2.3:o:intel:nuc7i5bnh_firmware:dnkbli30.86a.0026:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnh_firmware>>kyskli70.86a.0050
cpe:2.3:o:intel:nuc7i5bnh_firmware:kyskli70.86a.0050:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnh_firmware>>rybdwi35.86a.0366
cpe:2.3:o:intel:nuc7i5bnh_firmware:rybdwi35.86a.0366:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnh_firmware>>syskli35.86a.0062
cpe:2.3:o:intel:nuc7i5bnh_firmware:syskli35.86a.0062:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnh_firmware>>tybyt20h.86a.0015
cpe:2.3:o:intel:nuc7i5bnh_firmware:tybyt20h.86a.0015:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnh>>-
cpe:2.3:h:intel:nuc7i5bnh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnk_firmware>>ayaplcel.86a.0041
cpe:2.3:o:intel:nuc7i5bnk_firmware:ayaplcel.86a.0041:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnk_firmware>>bnkbl357.86a.0052
cpe:2.3:o:intel:nuc7i5bnk_firmware:bnkbl357.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnk_firmware>>ccsklm5v.86a.0052
cpe:2.3:o:intel:nuc7i5bnk_firmware:ccsklm5v.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnk_firmware>>ccsklm30.86a.0052
cpe:2.3:o:intel:nuc7i5bnk_firmware:ccsklm30.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnk_firmware>>dnkbli5v.86a.0026
cpe:2.3:o:intel:nuc7i5bnk_firmware:dnkbli5v.86a.0026:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnk_firmware>>dnkbli30.86a.0026
cpe:2.3:o:intel:nuc7i5bnk_firmware:dnkbli30.86a.0026:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnk_firmware>>kyskli70.86a.0050
cpe:2.3:o:intel:nuc7i5bnk_firmware:kyskli70.86a.0050:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnk_firmware>>rybdwi35.86a.0366
cpe:2.3:o:intel:nuc7i5bnk_firmware:rybdwi35.86a.0366:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnk_firmware>>syskli35.86a.0062
cpe:2.3:o:intel:nuc7i5bnk_firmware:syskli35.86a.0062:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnk_firmware>>tybyt20h.86a.0015
cpe:2.3:o:intel:nuc7i5bnk_firmware:tybyt20h.86a.0015:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i5bnk>>-
cpe:2.3:h:intel:nuc7i5bnk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnh_firmware>>ayaplcel.86a.0041
cpe:2.3:o:intel:nuc7i3bnh_firmware:ayaplcel.86a.0041:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnh_firmware>>bnkbl357.86a.0052
cpe:2.3:o:intel:nuc7i3bnh_firmware:bnkbl357.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnh_firmware>>ccsklm5v.86a.0052
cpe:2.3:o:intel:nuc7i3bnh_firmware:ccsklm5v.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnh_firmware>>ccsklm30.86a.0052
cpe:2.3:o:intel:nuc7i3bnh_firmware:ccsklm30.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnh_firmware>>dnkbli5v.86a.0026
cpe:2.3:o:intel:nuc7i3bnh_firmware:dnkbli5v.86a.0026:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnh_firmware>>dnkbli30.86a.0026
cpe:2.3:o:intel:nuc7i3bnh_firmware:dnkbli30.86a.0026:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnh_firmware>>kyskli70.86a.0050
cpe:2.3:o:intel:nuc7i3bnh_firmware:kyskli70.86a.0050:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnh_firmware>>rybdwi35.86a.0366
cpe:2.3:o:intel:nuc7i3bnh_firmware:rybdwi35.86a.0366:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnh_firmware>>syskli35.86a.0062
cpe:2.3:o:intel:nuc7i3bnh_firmware:syskli35.86a.0062:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnh_firmware>>tybyt20h.86a.0015
cpe:2.3:o:intel:nuc7i3bnh_firmware:tybyt20h.86a.0015:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnh>>-
cpe:2.3:h:intel:nuc7i3bnh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnk_firmware>>ayaplcel.86a.0041
cpe:2.3:o:intel:nuc7i3bnk_firmware:ayaplcel.86a.0041:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnk_firmware>>bnkbl357.86a.0052
cpe:2.3:o:intel:nuc7i3bnk_firmware:bnkbl357.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnk_firmware>>ccsklm5v.86a.0052
cpe:2.3:o:intel:nuc7i3bnk_firmware:ccsklm5v.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnk_firmware>>ccsklm30.86a.0052
cpe:2.3:o:intel:nuc7i3bnk_firmware:ccsklm30.86a.0052:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnk_firmware>>dnkbli5v.86a.0026
cpe:2.3:o:intel:nuc7i3bnk_firmware:dnkbli5v.86a.0026:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc7i3bnk_firmware>>dnkbli30.86a.0026
cpe:2.3:o:intel:nuc7i3bnk_firmware:dnkbli30.86a.0026:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-269Primarynvd@nist.gov
CWE ID: CWE-269
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/101236secure@intel.com
Third Party Advisory
VDB Entry
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084&languageid=en-frsecure@intel.com
Patch
Third Party Advisory
http://www.securityfocus.com/bid/101236af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084&languageid=en-fraf854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/101236
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084&languageid=en-fr
Source: secure@intel.com
Resource:
Patch
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/101236
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084&languageid=en-fr
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

58Records found

CVE-2019-19355
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7||HIGH
EPSS-0.11% / 29.49%
||
7 Day CHG~0.00%
Published-18 Mar, 2020 | 16:35
Updated-05 Aug, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insecure modification vulnerability in the /etc/passwd file was found in the openshift/ocp-release-operator-sdk. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. This CVE is specific to the openshift/ansible-operator-container as shipped in Openshift 4.

Action-Not Available
Vendor-Red Hat, Inc.
Product-openshiftopenshift
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-269
Improper Privilege Management
CVE-2019-19351
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7||HIGH
EPSS-0.11% / 29.49%
||
7 Day CHG~0.00%
Published-18 Mar, 2020 | 16:33
Updated-05 Aug, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insecure modification vulnerability in the /etc/passwd file was found in the container openshift/jenkins. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. This CVE is specific to the openshift/jenkins-slave-base-rhel7-containera as shipped in Openshift 4 and 3.11.

Action-Not Available
Vendor-Red Hat, Inc.
Product-openshiftopenshift
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-269
Improper Privilege Management
CVE-2019-19346
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 12.32%
||
7 Day CHG~0.00%
Published-02 Apr, 2020 | 19:12
Updated-05 Aug, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insecure modification vulnerability in the /etc/passwd file was found in the container openshift/mariadb-apb, affecting versions before the following 4.3.5, 4.2.21, 4.1.37, and 3.11.188-4 . An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.

Action-Not Available
Vendor-Openshift EnterpriseRed Hat, Inc.
Product-openshiftopenshift/mariadb-apb
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-21428
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.05% / 15.45%
||
7 Day CHG~0.00%
Published-10 May, 2021 | 18:50
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Creation of Temporary File in Directory with Insecure Permissions in the OpenAPI-Generator online generator

Openapi generator is a java tool which allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. openapi-generator-online creates insecure temporary folders with File.createTempFile during the code generation process. The insecure temporary folders store the auto-generated files which can be read and appended to by any users on the system. The issue has been patched with `Files.createTempFile` and released in the v5.1.0 stable version.

Action-Not Available
Vendor-openapi-generatorOpenAPITools
Product-openapi_generatoropenapi-generator
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2019-12522
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.5||MEDIUM
EPSS-0.18% / 39.53%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 19:00
Updated-04 Aug, 2024 | 23:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.

Action-Not Available
Vendor-n/aSquid Cache
Product-squidn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2020-7335
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-7.5||HIGH
EPSS-0.04% / 12.66%
||
7 Day CHG~0.00%
Published-01 Dec, 2020 | 08:50
Updated-04 Aug, 2024 | 09:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege Escalation vulnerability in McAfee Total Protection (MTP)

Privilege Escalation vulnerability in Microsoft Windows client McAfee Total Protection (MTP) prior to 16.0.29 allows local users to gain elevated privileges via careful manipulation of a folder by creating a junction link. This exploits a lack of protection through a timing issue and is only exploitable in a small time window.

Action-Not Available
Vendor-McAfee, LLC
Product-total_protectionMcAfee Total Protection (MTP)
CWE ID-CWE-269
Improper Privilege Management
CVE-2020-7523
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.25%
||
7 Day CHG~0.00%
Published-31 Aug, 2020 | 16:11
Updated-04 Aug, 2024 | 09:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Privilege Management vulnerability exists in Schneider Electric Modbus Serial Driver (see security notification for versions) which could cause local privilege escalation when the Modbus Serial Driver service is invoked. The driver does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Action-Not Available
Vendor-n/a
Product-modbus_serial_drivermodbus_driver_suiteSchneider Electric Modbus Serial Driver (64 bits) versions prior to V3.20 IE 30, Schneider Electric Modbus Serial Driver (32 bits) versions prior to V2.20 IE 30, and Schneider Electric Modbus Driver Suite versions prior to V14.15.0.0
CWE ID-CWE-269
Improper Privilege Management
CVE-2020-18169
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.17%
||
7 Day CHG~0.00%
Published-26 Jul, 2021 | 18:26
Updated-04 Aug, 2024 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Windows installer XML (WiX) toolset of TechSmith Snagit 19.1.1.2860 allows attackers to escalate privileges. NOTE: Exploit of the Snagit installer would require the end user to ignore other safety mechanisms provided by the Host OS. See reference document for more details

Action-Not Available
Vendor-techsmithn/aMicrosoft Corporation
Product-windowssnagitn/a
CWE ID-CWE-269
Improper Privilege Management
  • Previous
  • 1
  • 2
  • Next
Details not found