CVE-2019-12091

The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from command injection vulnerability. Local users can use this vulnerability to execute code with NT\SYSTEM privilege.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:netskope:netskope:*:*:*:*:*:*:*:*
cpe:2.3:a:netskope:netskope:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:22

Type Values Removed Values Added
References () https://airbus-seclab.github.io/advisories/netskope.html - Third Party Advisory () https://airbus-seclab.github.io/advisories/netskope.html - Third Party Advisory
References () https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf - Permissions Required, Release Notes, Vendor Advisory () https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf - Permissions Required, Release Notes, Vendor Advisory
References () https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client - Permissions Required, Vendor Advisory () https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client - Permissions Required, Vendor Advisory

Information

Published : 2019-09-26 16:15

Updated : 2024-11-21 04:22


NVD link : CVE-2019-12091

Mitre link : CVE-2019-12091

CVE.ORG link : CVE-2019-12091


JSON object : View

Products Affected

netskope

  • netskope
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')