CVE-2019-6145
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs for finding this vulnerability and for reporting it to us.
Forcepoint VPN Client para Windows versiones anteriores a 6.6.1, presenta una vulnerabilidad de ruta de búsqueda sin comillas. Esto permite la escalada de privilegios locales a un usuario SYSTEM. Por defecto, solo los administradores locales pueden escribir ejecutables en los directorios vulnerables. Forcepoint agradece a Peleg Hadar de SafeBreach Labs por encontrar esta vulnerabilidad y por reportarnos.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-01-11 CVE Reserved
- 2019-09-20 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-428: Unquoted Search Path or Element
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://help.forcepoint.com/security/CVE/CVE-2019-6145.html | 2022-04-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Forcepoint Search vendor "Forcepoint" | Vpn Client Search vendor "Forcepoint" for product "Vpn Client" | < 6.6.1 Search vendor "Forcepoint" for product "Vpn Client" and version " < 6.6.1" | windows |
Affected
|