CVE-2020-22722

Rapid Software LLC Rapid SCADA 5.8.0 is affected by a local privilege escalation vulnerability in the ScadaAgentSvc.exe executable file. An attacker can obtain admin privileges by placing a malicious .exe file in the application and renaming it ScadaAgentSvc.exe, which would result in executing the binary as NT AUTHORITY\SYSTEM in a Windows operating system. For example, an attacker can plant a reverse shell from a low privileged user account and by restarting the computer, the malicious service will be started as NT AUTHORITY\SYSTEM by giving the attacker full system access to the remote PC.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rapidscada:rapid_scada:5.8.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:13

Type Values Removed Values Added
References () https://syhack.wordpress.com/2020/04/21/rapid-scada-local-privilege-escalation-vulnerability/ - Exploit, Third Party Advisory () https://syhack.wordpress.com/2020/04/21/rapid-scada-local-privilege-escalation-vulnerability/ - Exploit, Third Party Advisory

Information

Published : 2020-08-14 16:15

Updated : 2024-11-21 05:13


NVD link : CVE-2020-22722

Mitre link : CVE-2020-22722

CVE.ORG link : CVE-2020-22722


JSON object : View

Products Affected

rapidscada

  • rapid_scada

microsoft

  • windows
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type