CVE-2020-15593
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
SteelCentral Aternity Agent 11.0.0.120 on Windows mishandles IPC. It uses an executable running as a high privileged Windows service to perform administrative tasks and collect data from other processes. It distributes functionality among different processes and uses IPC (Inter-Process Communication) primitives to enable the processes to cooperate. Any user in the system is allowed to access the interprocess communication channel AternityAgentAssistantIpc, retrieve a serialized object and call object methods remotely. Among others, the methods allow any user to: (1) Create and/or overwrite arbitrary XML files across the system; (2) Create arbitrary directories across the system; and (3) Load arbitrary plugins (i.e., C# assemblies) from the "%PROGRAMFILES(X86)/Aternity Information Systems/Assistant/plugins” directory and execute code contained in them.
SteelCentral Aternity Agent versiones 11.0.0.120, en Windows maneja inapropiadamente IPC. Utiliza un ejecutable que se ejecuta como un servicio de Windows muy privilegiado para llevar a cabo tareas administrativas y recopilar datos de otros procesos. Distribuye la funcionalidad entre diferentes procesos y utiliza primitivas IPC (Inter-Process Communication) para permitir a los procesos cooperar. Cualquier usuario en el sistema puede acceder al canal de comunicación entre procesos AternityAgentAssistantIpc, recuperar un objeto serializado y llamar a métodos de objetos remotamente. Entre otros, los métodos permiten a cualquier usuario: (1) Crear y/o sobrescribir archivos XML arbitrarios en todo el sistema; (2) Crear directorios arbitrarios en todo el sistema; y (3) Cargar plugins arbitrarios (es decir, ensamblajes de C #) desde el directorio "%PROGRAMFILES(X86)/Aternity Information Systems/Assistant/plugins” y ejecutar el código contenido en ellos
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-07-07 CVE Reserved
- 2020-07-24 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://sec-consult.com/en/blog/advisories/privilege-escalation-vulnerability-in-steelcentral-aternity-agent-cve-2020-15592-cve-2020-15593 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Riverbed Search vendor "Riverbed" | Steelcentral Aternity Agent Search vendor "Riverbed" for product "Steelcentral Aternity Agent" | 11.0.0.120 Search vendor "Riverbed" for product "Steelcentral Aternity Agent" and version "11.0.0.120" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|