7.8
CVE-2019-6008
- EPSS 0.38%
- Published 26.12.2019 16:15:10
- Last modified 21.11.2024 04:45:54
- Source vultures@jpcert.or.jp
- Teams watchlist Login
- Open Login
An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ? R3.05.01), and InsightSuiteAE (R1.01.00 ? R1.06.00)) allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges.
Data is provided by the National Vulnerability Database (NVD)
Yokogawa ≫ Exaquantum SwPlatformwindows Version >= r1.10.00 <= r3.02.00
Yokogawa ≫ Exaquantum/batch SwPlatformwindows Version >= r1.01.00 <= r2.50.40
Yokogawa ≫ Insightsuiteae SwPlatformwindows Version >= r1.01.00 <= r1.06.00
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.38% | 0.565 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-428 Unquoted Search Path or Element
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.