Rapid Software LLC Rapid SCADA 5.8.0 is affected by a local privilege escalation vulnerability in the ScadaAgentSvc.exe executable file. An attacker can obtain admin privileges by placing a malicious .exe file in the application and renaming it ScadaAgentSvc.exe, which would result in executing the binary as NT AUTHORITY\SYSTEM in a Windows operating system. For example, an attacker can plant a reverse shell from a low privileged user account and by restarting the computer, the malicious service will be started as NT AUTHORITY\SYSTEM by giving the attacker full system access to the remote PC.
References
Link | Resource |
---|---|
https://syhack.wordpress.com/2020/04/21/rapid-scada-local-privilege-escalation-vulnerability/ | Exploit Third Party Advisory |
https://syhack.wordpress.com/2020/04/21/rapid-scada-local-privilege-escalation-vulnerability/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://syhack.wordpress.com/2020/04/21/rapid-scada-local-privilege-escalation-vulnerability/ - Exploit, Third Party Advisory |
Information
Published : 2020-08-14 16:15
Updated : 2024-11-21 05:13
NVD link : CVE-2020-22722
Mitre link : CVE-2020-22722
CVE.ORG link : CVE-2020-22722
JSON object : View
Products Affected
rapidscada
- rapid_scada
microsoft
- windows
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type