Описание
In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a file. This is limited in scope to the collection of process-execution telemetry, for executions against specific files where the SYSTEM user was denied access to the source file.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.0.7.9 (исключая)
cpe:2.3:a:dell:red_cloak_windows_agent:*:*:*:*:*:*:*:*
EPSS
Процентиль: 9%
0.00031
Низкий
3.3 Low
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-281
Связанные уязвимости
github
больше 3 лет назад
In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a malicious file.
EPSS
Процентиль: 9%
0.00031
Низкий
3.3 Low
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-281