Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-18364

Summary
Assigner-symantec
Assigner Org ID-80d3bcb6-88de-48c2-a47e-aebf795f19b5
Published At-08 Feb, 2019 | 17:00
Updated At-16 Sep, 2024 | 22:35
Rejected At-
Credits

Symantec Ghost Solution Suite (GSS) versions prior to 3.3 RU1 may be susceptible to a DLL hijacking vulnerability, which is a type of issue whereby a potential attacker attempts to execute unexpected code on your machine. This occurs via placement of a potentially foreign file (DLL) that the attacker then attempts to run via a linked application.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:symantec
Assigner Org ID:80d3bcb6-88de-48c2-a47e-aebf795f19b5
Published At:08 Feb, 2019 | 17:00
Updated At:16 Sep, 2024 | 22:35
Rejected At:
▼CVE Numbering Authority (CNA)

Symantec Ghost Solution Suite (GSS) versions prior to 3.3 RU1 may be susceptible to a DLL hijacking vulnerability, which is a type of issue whereby a potential attacker attempts to execute unexpected code on your machine. This occurs via placement of a potentially foreign file (DLL) that the attacker then attempts to run via a linked application.

Affected Products
Vendor
Symantec CorporationSymantec Corporation
Product
Ghost Solution Suite (GSS)
Versions
Affected
  • Prior to 3.3 RU1
Problem Types
TypeCWE IDDescription
textN/ADLL Hijack
Type: text
CWE ID: N/A
Description: DLL Hijack
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/106684
vdb-entry
x_refsource_BID
https://support.symantec.com/en_US/article.SYMSA1474.html
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/106684
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://support.symantec.com/en_US/article.SYMSA1474.html
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/106684
vdb-entry
x_refsource_BID
x_transferred
https://support.symantec.com/en_US/article.SYMSA1474.html
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/106684
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://support.symantec.com/en_US/article.SYMSA1474.html
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@symantec.com
Published At:08 Feb, 2019 | 17:29
Updated At:13 Feb, 2019 | 18:47

Symantec Ghost Solution Suite (GSS) versions prior to 3.3 RU1 may be susceptible to a DLL hijacking vulnerability, which is a type of issue whereby a potential attacker attempts to execute unexpected code on your machine. This occurs via placement of a potentially foreign file (DLL) that the attacker then attempts to run via a linked application.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.3HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Primary2.06.0MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
Type: Primary
Version: 3.0
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 6.0
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:S/C:P/I:P/A:P
CPE Matches

Symantec Corporation
symantec
>>ghost_solution_suite>>2.0
cpe:2.3:a:symantec:ghost_solution_suite:2.0:*:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>2.5
cpe:2.3:a:symantec:ghost_solution_suite:2.5:*:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.0
cpe:2.3:a:symantec:ghost_solution_suite:3.0:*:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.0
cpe:2.3:a:symantec:ghost_solution_suite:3.0:hf1:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.0
cpe:2.3:a:symantec:ghost_solution_suite:3.0:hf2:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.0
cpe:2.3:a:symantec:ghost_solution_suite:3.0:hf3:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.0
cpe:2.3:a:symantec:ghost_solution_suite:3.0:hf4:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.0
cpe:2.3:a:symantec:ghost_solution_suite:3.0:hf5:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.1
cpe:2.3:a:symantec:ghost_solution_suite:3.1:*:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.1
cpe:2.3:a:symantec:ghost_solution_suite:3.1:mp1:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.1
cpe:2.3:a:symantec:ghost_solution_suite:3.1:mp2:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.1
cpe:2.3:a:symantec:ghost_solution_suite:3.1:mp3:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.1
cpe:2.3:a:symantec:ghost_solution_suite:3.1:mp4:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.1
cpe:2.3:a:symantec:ghost_solution_suite:3.1:mp5:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.1
cpe:2.3:a:symantec:ghost_solution_suite:3.1:mp6:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.2
cpe:2.3:a:symantec:ghost_solution_suite:3.2:*:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.2
cpe:2.3:a:symantec:ghost_solution_suite:3.2:ru1:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.2
cpe:2.3:a:symantec:ghost_solution_suite:3.2:ru2:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.2
cpe:2.3:a:symantec:ghost_solution_suite:3.2:ru3:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.2
cpe:2.3:a:symantec:ghost_solution_suite:3.2:ru4:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.2
cpe:2.3:a:symantec:ghost_solution_suite:3.2:ru5:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.2
cpe:2.3:a:symantec:ghost_solution_suite:3.2:ru6:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.2
cpe:2.3:a:symantec:ghost_solution_suite:3.2:ru7:*:*:*:*:*:*
Symantec Corporation
symantec
>>ghost_solution_suite>>3.3
cpe:2.3:a:symantec:ghost_solution_suite:3.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-426Primarynvd@nist.gov
CWE ID: CWE-426
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/106684secure@symantec.com
Third Party Advisory
https://support.symantec.com/en_US/article.SYMSA1474.htmlsecure@symantec.com
Mitigation
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/106684
Source: secure@symantec.com
Resource:
Third Party Advisory
Hyperlink: https://support.symantec.com/en_US/article.SYMSA1474.html
Source: secure@symantec.com
Resource:
Mitigation
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

15Records found

CVE-2016-10258
Matching Score-8
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-8
Assigner-Symantec - A Division of Broadcom
CVSS Score-6.8||MEDIUM
EPSS-10.95% / 93.13%
||
7 Day CHG~0.00%
Published-11 Apr, 2018 | 14:00
Updated-17 Sep, 2024 | 02:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unrestricted file upload vulnerability in the Symantec Advanced Secure Gateway (ASG) and ProxySG management consoles. A malicious appliance administrator can upload arbitrary malicious files to the management console and trick another administrator user into downloading and executing malicious code.

Action-Not Available
Vendor-Broadcom Inc.Symantec Corporation
Product-advanced_secure_gatewaysymantec_proxysgProxySGAdvanced Secure Gateway (ASG)
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2013-4671
Matching Score-8
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-8
Assigner-Symantec - A Division of Broadcom
CVSS Score-6||MEDIUM
EPSS-0.77% / 72.54%
||
7 Day CHG~0.00%
Published-31 Jul, 2013 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site request forgery (CSRF) vulnerability in the management console on the Symantec Web Gateway (SWG) appliance before 5.1.1 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-web_gateway_appliance_8490web_gateway_appliance_8450web_gatewayn/a
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2017-6325
Matching Score-8
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-8
Assigner-Symantec - A Division of Broadcom
CVSS Score-6.6||MEDIUM
EPSS-3.60% / 87.31%
||
7 Day CHG~0.00%
Published-26 Jun, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Symantec Messaging Gateway can encounter a file inclusion vulnerability, which is a type of vulnerability that is most commonly found to affect web applications that rely on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is executed at run time. This file inclusion vulnerability subverts how an application loads code for execution. Successful exploitation of a file inclusion vulnerability will result in remote code execution on the web server that runs the affected web application.

Action-Not Available
Vendor-Symantec Corporation
Product-messaging_gatewayMessaging Gateway
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2016-3651
Matching Score-8
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-8
Assigner-Symantec - A Division of Broadcom
CVSS Score-8||HIGH
EPSS-1.49% / 80.24%
||
7 Day CHG~0.00%
Published-30 Jun, 2016 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to discover the PHP JSESSIONID value via unspecified vectors.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3653
Matching Score-8
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-8
Assigner-Symantec - A Division of Broadcom
CVSS Score-8||HIGH
EPSS-0.16% / 37.29%
||
7 Day CHG~0.00%
Published-30 Jun, 2016 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site request forgery (CSRF) vulnerabilities in management scripts in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allow remote authenticated users to hijack the authentication of arbitrary users.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managern/a
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2015-1491
Matching Score-8
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-8
Assigner-Symantec - A Division of Broadcom
CVSS Score-6||MEDIUM
EPSS-1.00% / 76.08%
||
7 Day CHG~0.00%
Published-01 Aug, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SQL injection vulnerability in the management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managern/a
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2018-18369
Matching Score-6
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-6
Assigner-Symantec - A Division of Broadcom
CVSS Score-7.8||HIGH
EPSS-0.40% / 59.64%
||
7 Day CHG~0.00%
Published-25 Apr, 2019 | 16:55
Updated-05 Aug, 2024 | 11:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Norton Security (Windows client) prior to 22.16.3 and SEP SBE (Windows client) prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22 & SEP-12.1.7484.7002, may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when an application looks to call a DLL for execution and an attacker provides a malicious DLL to use instead.

Action-Not Available
Vendor-Symantec Corporation
Product-endpoint_protection_cloudendpoint_protection_cloud_agentendpoint_protectionnorton_securitySymantec Endpoint Protection Small Business EditionNorton Security
CWE ID-CWE-426
Untrusted Search Path
CVE-2018-18367
Matching Score-6
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-6
Assigner-Symantec - A Division of Broadcom
CVSS Score-7.8||HIGH
EPSS-0.40% / 59.64%
||
7 Day CHG~0.00%
Published-25 Apr, 2019 | 19:22
Updated-05 Aug, 2024 | 11:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager (SEPM) prior to and including 12.1 RU6 MP9 and prior to 14.2 RU1 may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when an application looks to call a DLL for execution and an attacker provides a malicious DLL to use instead.

Action-Not Available
Vendor-Symantec Corporation
Product-endpoint_protection_managerSymantec Endpoint Protection Manager
CWE ID-CWE-426
Untrusted Search Path
CVE-2018-12245
Matching Score-6
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-6
Assigner-Symantec - A Division of Broadcom
CVSS Score-7.8||HIGH
EPSS-0.24% / 46.37%
||
7 Day CHG~0.00%
Published-29 Nov, 2018 | 14:00
Updated-05 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection prior to 14.2 MP1 may be susceptible to a DLL Preloading vulnerability, which in this case is an issue that can occur when an application being installed unintentionally loads a DLL provided by a potential attacker. Note that this particular type of exploit only manifests at install time; no remediation is required for software that has already been installed. This issue only impacted the Trialware media for Symantec Endpoint Protection, which has since been updated.

Action-Not Available
Vendor-Symantec Corporation
Product-endpoint_protectionSymantec Endpoint Protection (SEP)
CWE ID-CWE-426
Untrusted Search Path
CVE-2016-6593
Matching Score-6
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-6
Assigner-Symantec - A Division of Broadcom
CVSS Score-7.8||HIGH
EPSS-0.34% / 56.29%
||
7 Day CHG~0.00%
Published-08 Jan, 2020 | 15:02
Updated-06 Aug, 2024 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A code-execution vulnerability exists during startup in jhi.dll and otpiha.dll in Symantec VIP Access Desktop before 2.2.2, which could let local malicious users execute arbitrary code.

Action-Not Available
Vendor-Symantec Corporation
Product-vip_access_desktopVIP Access Desktop
CWE ID-CWE-426
Untrusted Search Path
CVE-2016-0018
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.3||HIGH
EPSS-6.82% / 90.95%
||
7 Day CHG~0.00%
Published-13 Jan, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 R2, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_7windows_8windows_server_2012windows_8.1windows_10n/a
CWE ID-CWE-426
Untrusted Search Path
CVE-2017-6189
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-0.10% / 27.48%
||
7 Day CHG~0.00%
Published-15 Mar, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Untrusted search path vulnerability in Amazon Kindle for PC before 1.19 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse DLL in the current working directory of the Kindle Setup installer.

Action-Not Available
Vendor-amazonn/a
Product-kindle_for_pcn/a
CWE ID-CWE-426
Untrusted Search Path
CVE-2017-2157
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-7.3||HIGH
EPSS-0.16% / 37.77%
||
7 Day CHG~0.00%
Published-12 May, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Untrusted search path vulnerability in installers for The Public Certification Service for Individuals "The JPKI user's software (for Windows 7 and later)" Ver3.1 and earlier, The Public Certification Service for Individuals "The JPKI user's software (for Windows Vista)", The Public Certification Service for Individuals "The JPKI user's software" Ver2.6 and earlier that were available until April 27, 2017 allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.

Action-Not Available
Vendor-jpkiJapan Agency for Local Authority Information Systems
Product-the_public_certification_service_for_individualsInstaller for The Public Certification Service for Individuals "The JPKI user's software"Installer for The Public Certification Service for Individuals "The JPKI user's software (for Windows 7 and later)"Installer for The Public Certification Service for Individuals "The JPKI user's software (for Windows Vista)"
CWE ID-CWE-426
Untrusted Search Path
CVE-2019-3646
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-6.9||MEDIUM
EPSS-0.30% / 52.76%
||
7 Day CHG~0.00%
Published-13 Sep, 2019 | 13:05
Updated-17 Sep, 2024 | 04:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
McAfee Total Protection - Free Antivirus Trial: DLL Search Order Hijacking vulnerability

DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Free Antivirus Trial 16.0.R18 and earlier allows local users to execute arbitrary code via execution from a compromised folder placed by an attacker with administrator rights.

Action-Not Available
Vendor-McAfee, LLC
Product-total_protectionMcAfee Total Protection - Free Antivirus Trial
CWE ID-CWE-714
Not Available
CWE ID-CWE-426
Untrusted Search Path
CVE-2019-6165
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.3||HIGH
EPSS-0.07% / 21.10%
||
7 Day CHG~0.00%
Published-19 Aug, 2019 | 14:56
Updated-16 Sep, 2024 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL search path vulnerability was reported in PaperDisplay Hotkey Service version 1.2.0.8 that could allow privilege escalation. Lenovo has ended support for PaperDisplay Hotkey software as the Night light feature introduced in Windows 10 Build 1703 provides similar features.

Action-Not Available
Vendor-Lenovo Group Limited
Product-yoga_700-14iskyoga_700-11isk_firmwareyoga_700-11iskyoga_700-14isk_firmwarePaperDisplay Hotkey Service
CWE ID-CWE-426
Untrusted Search Path
Details not found