CVE-2019-6145

Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs for finding this vulnerability and for reporting it to us.
Configurations

Configuration 1 (hide)

cpe:2.3:a:forcepoint:vpn_client:*:*:*:*:*:windows:*:*

History

21 Nov 2024, 04:46

Type Values Removed Values Added
References () https://help.forcepoint.com/security/CVE/CVE-2019-6145.html - Vendor Advisory () https://help.forcepoint.com/security/CVE/CVE-2019-6145.html - Vendor Advisory
References () https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145 - Exploit, Third Party Advisory () https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145 - Exploit, Third Party Advisory

Information

Published : 2019-09-20 20:15

Updated : 2024-11-21 04:46


NVD link : CVE-2019-6145

Mitre link : CVE-2019-6145

CVE.ORG link : CVE-2019-6145


JSON object : View

Products Affected

forcepoint

  • vpn_client
CWE
CWE-428

Unquoted Search Path or Element