Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs for finding this vulnerability and for reporting it to us.
References
Link | Resource |
---|---|
https://help.forcepoint.com/security/CVE/CVE-2019-6145.html | Vendor Advisory |
https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145 | Exploit Third Party Advisory |
https://help.forcepoint.com/security/CVE/CVE-2019-6145.html | Vendor Advisory |
https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://help.forcepoint.com/security/CVE/CVE-2019-6145.html - Vendor Advisory | |
References | () https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145 - Exploit, Third Party Advisory |
Information
Published : 2019-09-20 20:15
Updated : 2024-11-21 04:46
NVD link : CVE-2019-6145
Mitre link : CVE-2019-6145
CVE.ORG link : CVE-2019-6145
JSON object : View
Products Affected
forcepoint
- vpn_client
CWE
CWE-428
Unquoted Search Path or Element