7.8

CVE-2019-6008

An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ? R3.05.01), and InsightSuiteAE (R1.01.00 ? R1.06.00)) allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges.

Data is provided by the National Vulnerability Database (NVD)
YokogawaExaopc SwPlatformwindows Version >= r1.01.00 <= r3.77.00
YokogawaExaplog SwPlatformwindows Version >= r1.10.00 <= r3.30.00
YokogawaExaquantum SwPlatformwindows Version >= r1.10.00 <= r3.02.00
YokogawaExaquantum/batch SwPlatformwindows Version >= r1.01.00 <= r2.50.40
YokogawaExarqe SwPlatformwindows
YokogawaExasmoc SwPlatformwindows
YokogawaGa10 SwPlatformwindows Version >= r1.01.01 <= r3.05.01
YokogawaInsightsuiteae SwPlatformwindows Version >= r1.01.00 <= r1.06.00
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.38% 0.565
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-428 Unquoted Search Path or Element

The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.