FKIE_CVE-2020-13173
Vulnerability from fkie_nvd - Published: 2020-05-28 22:15 - Updated: 2024-11-21 05:00
Severity ?
Summary
Initialization of the pcoip_credential_provider in Teradici PCoIP Standard Agent for Windows and PCoIP Graphics Agent for Windows versions 19.11.1 and earlier creates an insecure named pipe, which allows an attacker to intercept sensitive information or possibly elevate privileges via pre-installing an application which acquires that named pipe.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| teradici | pcoip_graphics_agent | * | |
| teradici | pcoip_standard_agent | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:teradici:pcoip_graphics_agent:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "E60DA7DF-E802-4CDB-A7CD-C6CE14DE4A35",
"versionEndIncluding": "19.11.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:teradici:pcoip_standard_agent:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "AA6F3560-2CFD-4B73-8800-A9FE3B1AFBBE",
"versionEndIncluding": "19.11.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Initialization of the pcoip_credential_provider in Teradici PCoIP Standard Agent for Windows and PCoIP Graphics Agent for Windows versions 19.11.1 and earlier creates an insecure named pipe, which allows an attacker to intercept sensitive information or possibly elevate privileges via pre-installing an application which acquires that named pipe."
},
{
"lang": "es",
"value": "La inicializaci\u00f3n de pcoip_credential_provider en Teradici PCoIP Standard Agent para Windows y PCoIP Graphics Agent para Windows versiones 19.11.1 y anteriores, crea una tuber\u00eda nombrada de forma no segura, que permite a un atacante interceptar informaci\u00f3n confidencial o posiblemente elevar privilegios mediante la preinstalaci\u00f3n de una aplicaci\u00f3n que obtiene que tuber\u00eda nombr\u00f3."
}
],
"id": "CVE-2020-13173",
"lastModified": "2024-11-21T05:00:48.090",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-05-28T22:15:10.803",
"references": [
{
"source": "security@teradici.com",
"tags": [
"Vendor Advisory"
],
"url": "https://advisory.teradici.com/security-advisories/55/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://advisory.teradici.com/security-advisories/55/"
}
],
"sourceIdentifier": "security@teradici.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…