1 results (0.001 seconds)

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

In Adam Kropelin adk0212 APC UPS Daemon through 3.14.14, the default installation of APCUPSD allows a local authenticated, but unprivileged, user to run arbitrary code with elevated privileges by replacing the service executable apcupsd.exe with a malicious executable that will run with SYSTEM privileges at startup. This occurs because of "RW NT AUTHORITY\Authenticated Users" permissions for %SYSTEMDRIVE%\apcupsd\bin\apcupsd.exe. En Demonio APC UPS hasta versión 3.14.14 de Adam Kropelin adk0212 , la instalación por defecto de APCUPSD permite que un usuario identificado local, pero no privilegiado, ejecute código arbitrario con privilegios elevados al reemplazar el servicio ejecutable apcupsd.exe con un ejecutable malicioso que se ejecutará con privilegios SYSTEM en el inicio. Esto ocurre debido a los permisos "RW NT AUTHORITY\Authenticated Users" para %SYSTEMDRIVE%\apcupsd\bin\apcupsd.exe. APC UPS Daemon versions 3.14.14 and below suffer from a privilege escalation vulnerability. • http://seclists.org/fulldisclosure/2017/Jun/20 http://www.securityfocus.com/bid/99092 http://www.securitytracker.com/id/1038707 • CWE-427: Uncontrolled Search Path Element •