CVE-2020-36154

The Application Wrapper in Pearson VUE VTS Installer 2.3.1911 has Full Control permissions for Everyone in the "%SYSTEMDRIVE%\Pearson VUE" directory, which allows local users to obtain administrative privileges via a Trojan horse application.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pearson:vue_testing_system:2.3.1911:*:*:*:*:*:*:*

History

21 Nov 2024, 05:28

Type Values Removed Values Added
References () https://github.com/passtheticket/vulnerability-research/blob/main/privilege-escalation/pearsonvue-readme.md - Exploit, Third Party Advisory () https://github.com/passtheticket/vulnerability-research/blob/main/privilege-escalation/pearsonvue-readme.md - Exploit, Third Party Advisory
References () https://www.exploit-db.com/exploits/49143 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/49143 - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2021-01-04 17:15

Updated : 2024-11-21 05:28


NVD link : CVE-2020-36154

Mitre link : CVE-2020-36154

CVE.ORG link : CVE-2020-36154


JSON object : View

Products Affected

pearson

  • vue_testing_system
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource