Improper directory permissions in the Hotspot Shield VPN client software for Windows 10.3.0 and earlier may allow an authorized user to potentially enable escalation of privilege via local access. The vulnerability allows a local user to corrupt system files: a local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.
References
Link | Resource |
---|---|
https://cymptom.com/cve-2020-17365-hotspot-shield-vpn-new-privilege-escalation-vulnerability/2020/10/ | Third Party Advisory |
https://www.pango.co/sec31944/ | Vendor Advisory |
https://cymptom.com/cve-2020-17365-hotspot-shield-vpn-new-privilege-escalation-vulnerability/2020/10/ | Third Party Advisory |
https://www.pango.co/sec31944/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://cymptom.com/cve-2020-17365-hotspot-shield-vpn-new-privilege-escalation-vulnerability/2020/10/ - Third Party Advisory | |
References | () https://www.pango.co/sec31944/ - Vendor Advisory |
Information
Published : 2020-09-24 23:15
Updated : 2024-11-21 05:07
NVD link : CVE-2020-17365
Mitre link : CVE-2020-17365
CVE.ORG link : CVE-2020-17365
JSON object : View
Products Affected
pango
- hotspot_shield