Forcepoint VPN Client up to 6.6.0 on Windows Unquoted Search Path unquoted search path
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.0 | $0-$5k | 0.00 |
A vulnerability has been found in Forcepoint VPN Client up to 6.6.0 on Windows (Network Encryption Software) and classified as critical. Affected by this vulnerability is an unknown functionality of the component Unquoted Search Path. The manipulation with an unknown input leads to a unquoted search path vulnerability. The CWE definition for the vulnerability is CWE-428. The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs for finding this vulnerability and for reporting it to us.
The weakness was disclosed 09/20/2019 (Website). It is possible to read the advisory at support.forcepoint.com. This vulnerability is known as CVE-2019-6145 since 01/11/2019. Attacking locally is a requirement. The successful exploitation needs a single authentication. The technical details are unknown and an exploit is not publicly available. The attack technique deployed by this issue is T1574.009 according to MITRE ATT&CK.
Upgrading to version 6.6.1 eliminates this vulnerability.
Product
Type
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 7.1
VulDB Base Score: 7.8
VulDB Temp Score: 7.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 6.7
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Unquoted search pathCWE: CWE-428 / CWE-426
CAPEC: 🔍
ATT&CK: 🔍
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: VPN Client 6.6.1
Timeline
01/11/2019 🔍09/20/2019 🔍
09/21/2019 🔍
09/01/2020 🔍
Sources
Advisory: support.forcepoint.comStatus: Not defined
Confirmation: 🔍
CVE: CVE-2019-6145 (🔍)
Entry
Created: 09/21/2019 08:36Updated: 09/01/2020 17:02
Changes: 09/21/2019 08:36 (58), 09/01/2020 17:02 (1)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.