Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-10138

Опубликовано: 21 окт. 2020
Источник: nvd
CVSS3: 7.8
CVSS2: 7.2
EPSS Низкий

Описание

Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:acronis:cyber_backup:*:*:*:*:*:*:*:*
Версия до 12.5 (исключая)
cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*
Версия до 15 (исключая)

EPSS

Процентиль: 14%
0.00045
Низкий

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-284
CWE-665

Связанные уязвимости

github
больше 3 лет назад

Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.

EPSS

Процентиль: 14%
0.00045
Низкий

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-284
CWE-665