Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-36162

Опубликовано: 06 янв. 2021
Источник: nvd
CVSS3: 9.3
CVSS3: 8.8
CVSS2: 7.2
EPSS Низкий

Описание

An issue was discovered in Veritas CloudPoint before 8.3.0.1+hotfix. The CloudPoint Windows Agent leverages OpenSSL. This OpenSSL library attempts to load the \usr\local\ssl\openssl.cnf configuration file, which does not exist. By default, on Windows systems users can create directories under :. A low privileged user can create a :\usr\local\ssl\openssl.cnf configuration file to load a malicious OpenSSL engine, which may result in arbitrary code execution. This would give the attacker administrator access on the system, allowing the attacker (by default) to access all data, access all installed applications, etc.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:veritas:cloudpoint:1.0:*:*:*:*:*:*:*
cpe:2.3:a:veritas:cloudpoint:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:veritas:cloudpoint:2.0:*:*:*:*:*:*:*
cpe:2.3:a:veritas:cloudpoint:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:veritas:cloudpoint:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:veritas:cloudpoint:2.1:*:*:*:*:*:*:*
cpe:2.3:a:veritas:cloudpoint:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:veritas:cloudpoint:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:veritas:cloudpoint:2.2:*:*:*:*:*:*:*
cpe:2.3:a:veritas:cloudpoint:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:veritas:cloudpoint:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:veritas:netbackup_cloudpoint:8.3:*:*:*:*:*:*:*
cpe:2.3:a:veritas:netbackup_cloudpoint:8.3.0.1:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

EPSS

Процентиль: 16%
0.00049
Низкий

9.3 Critical

CVSS3

8.8 High

CVSS3

7.2 High

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

github
больше 3 лет назад

An issue was discovered in Veritas CloudPoint before 8.3.0.1+hotfix. The CloudPoint Windows Agent leverages OpenSSL. This OpenSSL library attempts to load the \usr\local\ssl\openssl.cnf configuration file, which does not exist. By default, on Windows systems users can create directories under <drive>:\. A low privileged user can create a <drive>:\usr\local\ssl\openssl.cnf configuration file to load a malicious OpenSSL engine, which may result in arbitrary code execution. This would give the attacker administrator access on the system, allowing the attacker (by default) to access all data, access all installed applications, etc.

EPSS

Процентиль: 16%
0.00049
Низкий

9.3 Critical

CVSS3

8.8 High

CVSS3

7.2 High

CVSS2

Дефекты

NVD-CWE-noinfo