3 results (0.002 seconds)

CVSS: 4.4EPSS: 0%CPEs: 1EXPL: 0

A vulnerability in the automatic update process of Cisco Umbrella Roaming Client for Windows could allow an authenticated, local attacker to install arbitrary, unapproved applications on a targeted device. The vulnerability is due to insufficient verification of the Windows Installer. An attacker could exploit this vulnerability by placing a file in a specific location in the Windows file system. A successful exploit could allow the attacker to bypass configured policy and install unapproved applications. Una vulnerabilidad en el proceso de actualización automática de Cisco Umbrella Roaming Client para Windows, podría permitir a un atacante local autenticado instalar aplicaciones arbitrarias y no aprobadas en un dispositivo apuntado. • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-umbrella-msi-install • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 1

A vulnerability in the Cisco Umbrella Enterprise Roaming Client (ERC) could allow an authenticated, local attacker to elevate privileges to Administrator. To exploit the vulnerability, the attacker must authenticate with valid local user credentials. This vulnerability is due to improper implementation of file system permissions, which could allow non-administrative users to place files within restricted directories. An attacker could exploit this vulnerability by placing an executable file within the restricted directory, which when executed by the ERC client, would run with Administrator privileges. Una vulnerabilidad en Cisco Umbrella Enterprise Roaming Client (ERC) podría permitir que un atacante local autenticado eleve privilegios a Administrator. • https://www.exploit-db.com/exploits/45339 http://www.securityfocus.com/bid/105292 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-priv • CWE-264: Permissions, Privileges, and Access Controls CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability in the Cisco Umbrella Enterprise Roaming Client (ERC) could allow an authenticated, local attacker to elevate privileges to Administrator. To exploit the vulnerability, the attacker must authenticate with valid local user credentials. This vulnerability is due to improper implementation of file system permissions, which could allow non-administrative users to place files within restricted directories. An attacker could exploit this vulnerability by placing an executable file within the restricted directory, which when executed by the ERC client, would run with Administrator privileges. Una vulnerabilidad en Cisco Umbrella Enterprise Roaming Client (ERC) podría permitir que un atacante local autenticado eleve privilegios a Administrator. • https://www.exploit-db.com/exploits/45339 http://www.securityfocus.com/bid/105286 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-file-read • CWE-20: Improper Input Validation CWE-269: Improper Privilege Management •