CVE-2019-14510
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
An issue was discovered in Kaseya VSA RMM through 9.5.0.22. When using the default configuration, the LAN Cache feature creates a local account FSAdminxxxxxxxxx (e.g., FSAdmin123456789) on the server that hosts the LAN Cache and all clients that are assigned to a LAN Cache. This account is placed into the local Administrators group of all clients assigned to the LAN Cache. When the assigned client is a Domain Controller, the FSAdminxxxxxxxxx account is created as a domain account and automatically added as a member of the domain BUILTIN\Administrators group. Using the well known Pass-the-Hash techniques, an attacker can use the same FSAdminxxxxxxxxx hash from any LAN Cache client and pass this to a Domain Controller, providing administrative rights to the attacker on any Domain Controller. (Local account Pass-the-Hash mitigations do not protect domain accounts.)
Se detectó un problema en Kaseya VSA RMM versiones hasta 9.5.0.22. Cuando es usada la configuración predeterminada, la funcionalidad LAN Cache crea una cuenta local FSAdminxxxxxxxxx (por ejemplo, FSAdmin123456789) en el servidor que aloja la LAN Cache y todos los clientes asignados a una LAN Cache. Esta cuenta es colocada en el grupo de administradores locales de todos los clientes asignados a la LAN Cache. Cuando el cliente asignado es un Controlador de Dominio, la cuenta FSAdminxxxxxxxxx es creada como una cuenta de dominio y agregada automáticamente como miembro del grupo BUILTIN\Administrators del dominio. Utilizando las conocidas técnicas Pass-the-Hash, un atacante puede usar el mismo hash de FSAdminxxxxxxxxx desde cualquier cliente de LAN Cache y pasarlo hacia un Controlador de Dominio, proporcionando derechos administrativos al atacante en cualquier Controlador de Dominio. (Las mitigaciones Pass-the-Hash de la cuenta local no protegen cuentas de dominio).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-08-01 CVE Reserved
- 2019-10-11 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-276: Incorrect Default Permissions
- CWE-287: Improper Authentication
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://community.kaseya.com/xsp/f/355.aspx | Release Notes | |
http://community.kaseya.com/xsp/f/355/t/24675.aspx | Release Notes | |
https://www.kaseya.com/products/vsa | Product |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Kaseya Search vendor "Kaseya" | Vsa Search vendor "Kaseya" for product "Vsa" | <= 9.5.0.22 Search vendor "Kaseya" for product "Vsa" and version " <= 9.5.0.22" | rmm |
Affected
|