Описание
An attacker could leverage an API to pass along a malicious file that could then manipulate the process creation command line in MDT AutoSave versions prior to v6.02.06 and run a command line argument. This could then be leveraged to run a malicious process.
Ссылки
- MitigationThird Party AdvisoryUS Government Resource
- MitigationThird Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 6.02.06 (исключая)Версия от 7.00 (включая) до 7.04 (включая)Версия до 4.01 (исключая)
Одно из
cpe:2.3:a:auvesy-mdt:autosave:*:*:*:*:*:*:*:*
cpe:2.3:a:auvesy-mdt:autosave:*:*:*:*:*:*:*:*
cpe:2.3:a:auvesy-mdt:autosave_for_system_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:auvesy-mdt:autosave_for_system_platform:5.00:*:*:*:*:*:*:*
EPSS
Процентиль: 53%
0.00296
Низкий
10 Critical
CVSS3
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-77
CWE-78
Связанные уязвимости
CVSS3: 9.8
github
почти 4 года назад
An attacker could leverage an API to pass along a malicious file that could then manipulate the process creation command line in MDT AutoSave versions prior to v6.02.06 and run a command line argument. This could then be leveraged to run a malicious process.
EPSS
Процентиль: 53%
0.00296
Низкий
10 Critical
CVSS3
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-77
CWE-78