CVE-2020-26155

Multiple files and folders in Utimaco SecurityServer 4.20.0.4 and 4.31.1.0. are installed with Read/Write permissions for authenticated users, which allows for binaries to be manipulated by non-administrator users. Additionally, entries are made to the PATH environment variable which, in conjunction with these weak permissions, could enable an attacker to perform a DLL hijacking attack.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:utimaco:block-safe_firmware:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:utimaco:block-safe_firmware:3.0.0:*:*:*:*:*:*:*
cpe:2.3:o:utimaco:cryptoserver_cp5_firmware:5.0.0.0:*:*:*:*:*:*:*
cpe:2.3:o:utimaco:cryptoserver_cp5_firmware:5.1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:utimaco:cryptoserver_cp5_vs-nfd_firmware:5.1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:utimaco:paymentserver_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:utimaco:paymentserver_hybrid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:utimaco:securityserver_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:19

Type Values Removed Values Added
References () https://hsm.utimaco.com/products-hardware-security-modules/general-purpose-hsm/ - Exploit, Vendor Advisory () https://hsm.utimaco.com/products-hardware-security-modules/general-purpose-hsm/ - Exploit, Vendor Advisory
References () https://secureyourit.co.uk/wp/2021/03/13/utimaco-cve-2020-26155/ - Third Party Advisory () https://secureyourit.co.uk/wp/2021/03/13/utimaco-cve-2020-26155/ - Third Party Advisory

Information

Published : 2021-03-18 17:15

Updated : 2024-11-21 05:19


NVD link : CVE-2020-26155

Mitre link : CVE-2020-26155

CVE.ORG link : CVE-2020-26155


JSON object : View

Products Affected

utimaco

  • paymentserver_hybrid_firmware
  • paymentserver_firmware
  • cryptoserver_cp5_firmware
  • securityserver_firmware
  • cryptoserver_cp5_vs-nfd_firmware
  • block-safe_firmware

microsoft

  • windows
CWE
CWE-427

Uncontrolled Search Path Element

CWE-732

Incorrect Permission Assignment for Critical Resource