All the vulnerabilites related to VIPRE - Advanced Security
cve-2024-5928
Vulnerability from cvelistv5
Published
2024-08-21 16:12
Modified
2024-08-21 17:43
Severity ?
EPSS score ?
Summary
VIPRE Advanced Security PMAgent Link Following Local Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-817/ | x_research-advisory | |
https://success.vipre.com/en_US/home-windows-release-notes/home-windows-release-notes-20240227 | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
VIPRE | Advanced Security |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vipre:advanced_security:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "advanced_security", "vendor": "vipre", "versions": [ { "status": "affected", "version": "12.0.1.214" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5928", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-21T17:42:34.491178Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-21T17:43:04.680Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Advanced Security", "vendor": "VIPRE", "versions": [ { "status": "affected", "version": "12.0.1.214" } ] } ], "dateAssigned": "2024-06-12T14:56:43.900-05:00", "datePublic": "2024-06-20T14:16:11.629-05:00", "descriptions": [ { "lang": "en", "value": "VIPRE Advanced Security PMAgent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Patch Management Agent. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22315." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-21T16:12:11.872Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-817", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-817/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://success.vipre.com/en_US/home-windows-release-notes/home-windows-release-notes-20240227" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "VIPRE Advanced Security PMAgent Link Following Local Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-5928", "datePublished": "2024-08-21T16:12:11.872Z", "dateReserved": "2024-06-12T19:56:43.863Z", "dateUpdated": "2024-08-21T17:43:04.680Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-7239
Vulnerability from cvelistv5
Published
2024-11-22 21:12
Modified
2024-11-22 21:12
Severity ?
EPSS score ?
Summary
VIPRE Advanced Security Link Following Local Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-1010/ | x_research-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
VIPRE | Advanced Security |
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Advanced Security", "vendor": "VIPRE", "versions": [ { "status": "affected", "version": "12.0.1.214" } ] } ], "dateAssigned": "2024-07-29T15:28:27.106-05:00", "datePublic": "2024-07-29T16:37:31.358-05:00", "descriptions": [ { "lang": "en", "value": "VIPRE Advanced Security Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Anti Malware Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22314." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T21:12:17.643Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-1010", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1010/" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "VIPRE Advanced Security Link Following Local Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-7239", "datePublished": "2024-11-22T21:12:17.643Z", "dateReserved": "2024-07-29T20:28:27.078Z", "dateUpdated": "2024-11-22T21:12:17.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5930
Vulnerability from cvelistv5
Published
2024-08-21 16:12
Modified
2024-08-21 17:41
Severity ?
EPSS score ?
Summary
VIPRE Advanced Security Incorrect Permission Assignment Local Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-819/ | x_research-advisory | |
https://success.vipre.com/en_US/home-windows-release-notes/home-windows-release-notes-20240227 | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
VIPRE | Advanced Security |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vipre:advanced_security:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "advanced_security", "vendor": "vipre", "versions": [ { "status": "affected", "version": "12.0.1.214" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5930", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-21T17:39:12.670087Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-21T17:41:30.614Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Advanced Security", "vendor": "VIPRE", "versions": [ { "status": "affected", "version": "12.0.1.214" } ] } ], "dateAssigned": "2024-06-12T14:57:29.790-05:00", "datePublic": "2024-06-20T14:16:41.933-05:00", "descriptions": [ { "lang": "en", "value": "VIPRE Advanced Security Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Anti Malware Service. The issue results from incorrect permissions on a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22345." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732: Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-21T16:12:21.066Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-819", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-819/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://success.vipre.com/en_US/home-windows-release-notes/home-windows-release-notes-20240227" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "VIPRE Advanced Security Incorrect Permission Assignment Local Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-5930", "datePublished": "2024-08-21T16:12:21.066Z", "dateReserved": "2024-06-12T19:57:29.764Z", "dateUpdated": "2024-08-21T17:41:30.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5929
Vulnerability from cvelistv5
Published
2024-08-21 16:12
Modified
2024-08-21 17:42
Severity ?
EPSS score ?
Summary
VIPRE Advanced Security PMAgent Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-818/ | x_research-advisory | |
https://success.vipre.com/en_US/home-windows-release-notes/home-windows-release-notes-20240227 | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
VIPRE | Advanced Security |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vipre:advanced_security:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "advanced_security", "vendor": "vipre", "versions": [ { "status": "affected", "version": "12.0.1.214" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5929", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-21T17:41:44.026618Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-21T17:42:18.984Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Advanced Security", "vendor": "VIPRE", "versions": [ { "status": "affected", "version": "12.0.1.214" } ] } ], "dateAssigned": "2024-06-12T14:57:05.165-05:00", "datePublic": "2024-06-20T14:16:27.138-05:00", "descriptions": [ { "lang": "en", "value": "VIPRE Advanced Security PMAgent Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Patch Management Agent. The issue results from loading a file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22316." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-21T16:12:17.122Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-818", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-818/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://success.vipre.com/en_US/home-windows-release-notes/home-windows-release-notes-20240227" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "VIPRE Advanced Security PMAgent Uncontrolled Search Path Element Local Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-5929", "datePublished": "2024-08-21T16:12:17.122Z", "dateReserved": "2024-06-12T19:57:05.137Z", "dateUpdated": "2024-08-21T17:42:18.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-7238
Vulnerability from cvelistv5
Published
2024-11-22 21:12
Modified
2024-11-22 21:12
Severity ?
EPSS score ?
Summary
VIPRE Advanced Security SBAMSvc Link Following Local Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-1011/ | x_research-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
VIPRE | Advanced Security |
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Advanced Security", "vendor": "VIPRE", "versions": [ { "status": "affected", "version": "12.0.1.214" } ] } ], "dateAssigned": "2024-07-29T15:28:11.884-05:00", "datePublic": "2024-07-29T16:37:37.338-05:00", "descriptions": [ { "lang": "en", "value": "VIPRE Advanced Security SBAMSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Anti Malware Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22238." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T21:12:21.729Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-1011", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1011/" } ], "source": { "lang": "en", "value": "Nicholas Zubrisky and Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative" }, "title": "VIPRE Advanced Security SBAMSvc Link Following Local Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-7238", "datePublished": "2024-11-22T21:12:21.729Z", "dateReserved": "2024-07-29T20:28:11.854Z", "dateUpdated": "2024-11-22T21:12:21.729Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }