CVE-2021-44750

An arbitrary code execution vulnerability was found in the F-Secure Support Tool. A standard user can craft a special configuration file, which when run by administrator can execute any commands.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:f-secure:client_security:-:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:countercept:-:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:elements:-:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:email_and_server_security:-:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:server_security:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:31

Type Values Removed Values Added
CVSS v2 : 8.5
v3 : 7.3
v2 : 8.5
v3 : 6.4
References () https://www.f-secure.com/en/business/support-and-downloads/security-advisories - Vendor Advisory () https://www.f-secure.com/en/business/support-and-downloads/security-advisories - Vendor Advisory
References () https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-44750 - Vendor Advisory () https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-44750 - Vendor Advisory

Information

Published : 2022-03-10 17:44

Updated : 2024-11-21 06:31


NVD link : CVE-2021-44750

Mitre link : CVE-2021-44750

CVE.ORG link : CVE-2021-44750


JSON object : View

Products Affected

f-secure

  • email_and_server_security
  • client_security
  • countercept
  • elements
  • server_security

microsoft

  • windows