3 results (0.002 seconds)

CVSS: 6.7EPSS: 0%CPEs: 1EXPL: 1

PCProtect Endpoint prior to v5.17.470 for Microsoft Windows lacks tamper protection, allowing authenticated attackers with Administrator privileges to modify processes within the application and escalate privileges to SYSTEM via a crafted executable. PCProtect Endpoint versiones anteriores a 5.17.470 para Microsoft Windows carece de protección contra manipulaciones, permitiendo a atacantes autenticados con privilegios de administrador modificar los procesos dentro de la aplicación y escalar los privilegios a SYSTEM por medio de un ejecutable diseñado. • https://mrvar0x.com/2022/07/21/pcprotect-endpoint-tampering-exploit • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

PC Protect Antivirus v4.14.31 installs by default to %PROGRAMFILES(X86)%\PCProtect with very weak folder permissions, granting any user full permission "Everyone: (F)" to the contents of the directory and its subfolders. In addition, the program installs a service called SecurityService that runs as LocalSystem. This allows any user to escalate privileges to "NT AUTHORITY\SYSTEM" by substituting the service's binary with a Trojan horse. PC Protect Antivirus versión v4.14.31, se instala por defecto en %PROGRAMFILES(X86)%\PCProtect con permisos de carpeta muy débiles, otorgando a cualquier usuario permiso completo "Everyone: (F)" para el contenido del directorio y sus subcarpetas. Además, el programa instala un servicio llamado SecurityService que es ejecutado como LocalSystem. • https://flipflopsecurity.wordpress.com/2019/10/07/pc-protect-v4-14-31-privilege-esclation • CWE-276: Incorrect Default Permissions •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

PCProtect Anti-Virus v4.8.35 has "Everyone: (F)" permission for %PROGRAMFILES(X86)%\PCProtect, which allows local users to gain privileges by replacing an executable file with a Trojan horse. PCProtect Anti-Virus v4.8.35 tiene el permiso "Everyone: (F)" para %PROGRAMFILES(X86)%\PCProtect, lo que permite que usuarios locales obtengan privilegios reemplazando un archivo ejecutable con un troyano. • https://www.exploit-db.com/exploits/45503 https://packetstormsecurity.com/files/149581/PCProtect-4-8.35-Privilege-Escalation.html • CWE-732: Incorrect Permission Assignment for Critical Resource •