CVE-2022-36670
 
Severity Score
6.7
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
PCProtect Endpoint prior to v5.17.470 for Microsoft Windows lacks tamper protection, allowing authenticated attackers with Administrator privileges to modify processes within the application and escalate privileges to SYSTEM via a crafted executable.
PCProtect Endpoint versiones anteriores a 5.17.470 para Microsoft Windows carece de protección contra manipulaciones, permitiendo a atacantes autenticados con privilegios de administrador modificar los procesos dentro de la aplicación y escalar los privilegios a SYSTEM por medio de un ejecutable diseñado.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2022-07-25 CVE Reserved
- 2022-09-06 CVE Published
- 2024-03-29 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://mrvar0x.com/2022/07/21/pcprotect-endpoint-tampering-exploit | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Pcprotect Search vendor "Pcprotect" | Endpoint Search vendor "Pcprotect" for product "Endpoint" | < 5.17.470 Search vendor "Pcprotect" for product "Endpoint" and version " < 5.17.470" | windows |
Affected
|