Multiple files and folders in Utimaco SecurityServer 4.20.0.4 and 4.31.1.0. are installed with Read/Write permissions for authenticated users, which allows for binaries to be manipulated by non-administrator users. Additionally, entries are made to the PATH environment variable which, in conjunction with these weak permissions, could enable an attacker to perform a DLL hijacking attack.
References
Link | Resource |
---|---|
https://hsm.utimaco.com/products-hardware-security-modules/general-purpose-hsm/ | Exploit Vendor Advisory |
https://secureyourit.co.uk/wp/2021/03/13/utimaco-cve-2020-26155/ | Third Party Advisory |
https://hsm.utimaco.com/products-hardware-security-modules/general-purpose-hsm/ | Exploit Vendor Advisory |
https://secureyourit.co.uk/wp/2021/03/13/utimaco-cve-2020-26155/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://hsm.utimaco.com/products-hardware-security-modules/general-purpose-hsm/ - Exploit, Vendor Advisory | |
References | () https://secureyourit.co.uk/wp/2021/03/13/utimaco-cve-2020-26155/ - Third Party Advisory |
Information
Published : 2021-03-18 17:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-26155
Mitre link : CVE-2020-26155
CVE.ORG link : CVE-2020-26155
JSON object : View
Products Affected
utimaco
- paymentserver_hybrid_firmware
- paymentserver_firmware
- cryptoserver_cp5_firmware
- securityserver_firmware
- cryptoserver_cp5_vs-nfd_firmware
- block-safe_firmware
microsoft
- windows