CVE-2019-17388

Weak file permissions applied to the Aviatrix VPN Client through 2.2.10 installation directory on Windows and Linux allow a local attacker to execute arbitrary code by gaining elevated privileges through file modifications.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:aviatrix:vpn_client:*:*:*:*:*:*:*:*
OR cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:32

Type Values Removed Values Added
References () https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html - Release Notes, Vendor Advisory () https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html - Release Notes, Vendor Advisory
References () https://immersivelabs.com/2019/12/04/aviatrix-vpn-client-vulnerability/ - Exploit, Third Party Advisory () https://immersivelabs.com/2019/12/04/aviatrix-vpn-client-vulnerability/ - Exploit, Third Party Advisory
References () https://immersivelabs.com/blog/ - Third Party Advisory () https://immersivelabs.com/blog/ - Third Party Advisory

Information

Published : 2019-12-05 18:15

Updated : 2024-11-21 04:32


NVD link : CVE-2019-17388

Mitre link : CVE-2019-17388

CVE.ORG link : CVE-2019-17388


JSON object : View

Products Affected

linux

  • linux_kernel

freebsd

  • freebsd

microsoft

  • windows

aviatrix

  • vpn_client
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource