In IXP EasyInstall 6.2.13723, there is Remote Code Execution via the Agent Service. An unauthenticated attacker can communicate with the Agent Service over TCP port 20051, and execute code in the NT AUTHORITY\SYSTEM context of the target system by using the Execute Command Line function.
References
Link | Resource |
---|---|
https://improsec.com/tech-blog/multiple-vulnerabilities-in-easyinstall-rmm-and-deployment-software | Exploit Third Party Advisory |
https://improsec.com/tech-blog/multiple-vulnerabilities-in-easyinstall-rmm-and-deployment-software | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://improsec.com/tech-blog/multiple-vulnerabilities-in-easyinstall-rmm-and-deployment-software - Exploit, Third Party Advisory |
Information
Published : 2020-01-23 21:15
Updated : 2024-11-21 04:35
NVD link : CVE-2019-19897
Mitre link : CVE-2019-19897
CVE.ORG link : CVE-2019-19897
JSON object : View
Products Affected
ixpdata
- easyinstall
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')