Описание
Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable.
Ссылки
- Vendor Advisory
- Vendor Advisory
- ExploitVendor Advisory
- Vendor Advisory
- Vendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:kerio:personal_firewall:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.16:*:*:*:*:*:*:*
EPSS
Процентиль: 23%
0.00076
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable.
EPSS
Процентиль: 23%
0.00076
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other