Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rxc8-x669-7284

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a malicious file.

In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a malicious file.

EPSS

Процентиль: 9%
0.00031
Низкий

Связанные уязвимости

CVSS3: 3.3
nvd
около 6 лет назад

In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a file. This is limited in scope to the collection of process-execution telemetry, for executions against specific files where the SYSTEM user was denied access to the source file.

EPSS

Процентиль: 9%
0.00031
Низкий