// For flags

CVE-2019-11644

 

Severity Score

7.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In the F-Secure installer in F-Secure SAFE for Windows before 17.6, F-Secure Internet Security before 17.6, F-Secure Anti-Virus before 17.6, F-Secure Client Security Standard and Premium before 14.10, F-Secure PSB Workstation Security before 12.01, and F-Secure Computer Protection Standard and Premium before 19.3, a local user can escalate their privileges through a DLL hijacking attack against the installer. The installer writes the file rm.exe to C:\Windows\Temp and then executes it. The rm.exe process then attempts to load several DLLs from its current directory. Non-admin users are able to write to this folder, so an attacker can create a malicious C:\Windows\Temp\OLEACC.dll file. When an admin runs the installer, rm.exe will execute the attacker's DLL in an elevated security context.

En el instalador de F-Secure en F-Secure SAFE para Windows antes de 17.6, F-Secure Internet Security antes de 17.6, F-Secure Anti-Virus antes de 17.6, F-Secure Client Security Standard y Premium antes de 14.10, F-Secure PSB Workstation Security antes del 12.01, y F-Secure Computer Protection Standard y Premium antes del 19.3, un usuario local puede escalar sus privilegios a través de un ataque de secuestro de DLL contra el instalador. El instalador escribe el archivo rm.exe en C: \ Windows \ Temp y luego lo ejecuta. El proceso rm.exe luego intenta cargar varias DLL desde su directorio actual. Los usuarios que no son administradores pueden escribir en esta carpeta, por lo que un atacante puede crear un archivo malicioso C: \ Windows \ Temp \ OLEACC.dll. Cuando un administrador ejecuta el instalador, rm.exe ejecutará la DLL del atacante en un contexto de seguridad elevado.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-05-01 CVE Reserved
  • 2019-05-17 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-427: Uncontrolled Search Path Element
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
F-secure
Search vendor "F-secure"
Client Security
Search vendor "F-secure" for product "Client Security"
< 14.10
Search vendor "F-secure" for product "Client Security" and version " < 14.10"
premium
Affected
F-secure
Search vendor "F-secure"
Client Security
Search vendor "F-secure" for product "Client Security"
< 14.10
Search vendor "F-secure" for product "Client Security" and version " < 14.10"
standard
Affected
F-secure
Search vendor "F-secure"
Computer Protection
Search vendor "F-secure" for product "Computer Protection"
< 19.3
Search vendor "F-secure" for product "Computer Protection" and version " < 19.3"
premium
Affected
F-secure
Search vendor "F-secure"
Computer Protection
Search vendor "F-secure" for product "Computer Protection"
< 19.3
Search vendor "F-secure" for product "Computer Protection" and version " < 19.3"
standard
Affected
F-secure
Search vendor "F-secure"
Internet Security
Search vendor "F-secure" for product "Internet Security"
< 17.6
Search vendor "F-secure" for product "Internet Security" and version " < 17.6"
-
Affected
F-secure
Search vendor "F-secure"
Psb Workstation Security
Search vendor "F-secure" for product "Psb Workstation Security"
< 12.01
Search vendor "F-secure" for product "Psb Workstation Security" and version " < 12.01"
-
Affected
F-secure
Search vendor "F-secure"
Safe
Search vendor "F-secure" for product "Safe"
< 17.6
Search vendor "F-secure" for product "Safe" and version " < 17.6"
windows
Affected