// For flags

CVE-2019-14510

 

Severity Score

6.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Kaseya VSA RMM through 9.5.0.22. When using the default configuration, the LAN Cache feature creates a local account FSAdminxxxxxxxxx (e.g., FSAdmin123456789) on the server that hosts the LAN Cache and all clients that are assigned to a LAN Cache. This account is placed into the local Administrators group of all clients assigned to the LAN Cache. When the assigned client is a Domain Controller, the FSAdminxxxxxxxxx account is created as a domain account and automatically added as a member of the domain BUILTIN\Administrators group. Using the well known Pass-the-Hash techniques, an attacker can use the same FSAdminxxxxxxxxx hash from any LAN Cache client and pass this to a Domain Controller, providing administrative rights to the attacker on any Domain Controller. (Local account Pass-the-Hash mitigations do not protect domain accounts.)

Se detectó un problema en Kaseya VSA RMM versiones hasta 9.5.0.22. Cuando es usada la configuración predeterminada, la funcionalidad LAN Cache crea una cuenta local FSAdminxxxxxxxxx (por ejemplo, FSAdmin123456789) en el servidor que aloja la LAN Cache y todos los clientes asignados a una LAN Cache. Esta cuenta es colocada en el grupo de administradores locales de todos los clientes asignados a la LAN Cache. Cuando el cliente asignado es un Controlador de Dominio, la cuenta FSAdminxxxxxxxxx es creada como una cuenta de dominio y agregada automáticamente como miembro del grupo BUILTIN\Administrators del dominio. Utilizando las conocidas técnicas Pass-the-Hash, un atacante puede usar el mismo hash de FSAdminxxxxxxxxx desde cualquier cliente de LAN Cache y pasarlo hacia un Controlador de Dominio, proporcionando derechos administrativos al atacante en cualquier Controlador de Dominio. (Las mitigaciones Pass-the-Hash de la cuenta local no protegen cuentas de dominio).

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-08-01 CVE Reserved
  • 2019-10-11 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • 2024-10-04 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-276: Incorrect Default Permissions
  • CWE-287: Improper Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Kaseya
Search vendor "Kaseya"
Vsa
Search vendor "Kaseya" for product "Vsa"
<= 9.5.0.22
Search vendor "Kaseya" for product "Vsa" and version " <= 9.5.0.22"
rmm
Affected