2 results (0.016 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 1

A vulnerability in the Cisco Umbrella Enterprise Roaming Client (ERC) could allow an authenticated, local attacker to elevate privileges to Administrator. To exploit the vulnerability, the attacker must authenticate with valid local user credentials. This vulnerability is due to improper implementation of file system permissions, which could allow non-administrative users to place files within restricted directories. An attacker could exploit this vulnerability by placing an executable file within the restricted directory, which when executed by the ERC client, would run with Administrator privileges. Una vulnerabilidad en Cisco Umbrella Enterprise Roaming Client (ERC) podría permitir que un atacante local autenticado eleve privilegios a Administrator. • https://www.exploit-db.com/exploits/45339 http://www.securityfocus.com/bid/105292 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-priv • CWE-264: Permissions, Privileges, and Access Controls CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability in the Cisco Umbrella Enterprise Roaming Client (ERC) could allow an authenticated, local attacker to elevate privileges to Administrator. To exploit the vulnerability, the attacker must authenticate with valid local user credentials. This vulnerability is due to improper implementation of file system permissions, which could allow non-administrative users to place files within restricted directories. An attacker could exploit this vulnerability by placing an executable file within the restricted directory, which when executed by the ERC client, would run with Administrator privileges. Una vulnerabilidad en Cisco Umbrella Enterprise Roaming Client (ERC) podría permitir que un atacante local autenticado eleve privilegios a Administrator. • https://www.exploit-db.com/exploits/45339 http://www.securityfocus.com/bid/105286 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-file-read • CWE-20: Improper Input Validation CWE-269: Improper Privilege Management •